+About Us
BOOK
SHELF
SHOP
CART
Home > INTERNATIONAL > IT and Communications law > Data protection law
Information Security Law in the EU and the U.S.
0%
Saving
Great Deals

Information Security Law in the EU and the U.S.

by Lukas Feiler
Edition: 2012
Rs.14400.00
0% off
Information Security Law in the EU and the U.S. 0 Reviews | Write A Review
Your selected options are:
Free Shipping
FREE DELIVERY:
Want a Shipping Estimate? Add an Indian Pin Code, Click Here

Ships in 3-4 Weeks
This Product is
Ships in 3-4 Weeks

recommendation
Recommend
recommendation 1

  • Share
    1
  • Share
    1
  • Share
    0
  • Share
    1
  • Send By e-mail

Commendations

Related Books

By Ian Long
Rs. 7,499.00
By Lee Andrew Bygrave ...
Rs. 8,700.00
By Christopher Kuner (...
Rs. 10,500.00
By Lambert, Dr. Paul
Rs. 13,800.00  Rs. 11,730.00
By Room, Stewart
Rs. 9,480.00  Rs. 8,058.00

Product Details:

Format: Hardback
Publisher: Springer Verlag GmbH
Language: English
Dimensions: 0.00 X 0.79 X 0.00
Publisher Code: 9783709109250
Date Added: 2018-08-09
Search Category: International
Jurisdiction: International

Overview:

Security breaches affecting millions of consumers world-wide, media reports about "cyber war" and speculations about "cyber terrorism" have brought information security (often also referred to as "cyber security") to the forefront of the public debate. "Information Security Law in the EU and the U.S." provides the first comprehensive assessment of EU and U.S. information security law, covering laws and regulations that require the implementation of security measures, laws that impose or limit liability for security breaches, laws that mandate the disclosure of vulnerabilities or security breaches, and laws that deter malicious actors by providing criminal sanctions. To facilitate this comparative assessment, a risk-based assessment methodology is used. The book also contains a concluding comparative assessment that summarizes the current state of information security law. Building on this concluding assessment, policy recommendations are presented how to fundamentally improve information security.
+ View More

Table Of Contents:

1. Introduction .- 2. The Foundations and Challenges of Information Security .- 3. A Methodology for Assessing Regulatory Policies .- 4. Regulating Information Security by Mandating Security Controls .- 5. Regulating Information Security by Imposing or Limiting Liability .- 6. Regulating Information Security by Mandating Transparency .- 7. Regulating Information Security by Deterring Malicious Threat Agents .- 8. Concluding Comparative Assessment .- 9. Policy Recommendations .- 10. Conclusion .- References .- List of Abbreviations .- Index
+ View More

Best Sellers

By C.K. Takwani
Click on TITLE to choose available options.
By EBC
Click on TITLE to choose available options.
By Gopal Sankaranaraya...
Click on TITLE to choose available options.
By EBC
Click on TITLE to choose available options.
By Rajesh Kapoor
Click on TITLE to choose available options.

EBC RECOMMENDED

By C.K. Takwani
Click on TITLE to choose available options.
By Dr. Murlidhar Chatu...
Rs. 495.00  Rs. 421.00
By EBC
Click on TITLE to choose available options.
By Suranjan Chakravart...
Click on TITLE to choose available options.
By Rajesh Kapoor
Click on TITLE to choose available options.