Buy Cybersecurity Book by Roger L. Kemp - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Cybersecurity: Current Writings on Threats and Protection
Cybersecurity: Current Writings on Threats and Protection

Cybersecurity: Current Writings on Threats and Protection


     0     
5
4
3
2
1



International Edition


X
About the Book

Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk. This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.

Table of Contents:
Table of Contents Acknowledgments Preface Part I. An Overview 1. Government Employees Unaware They Are Cyber Crime Victims (Chelsea Binns) 2. Cybersecurity and America’s Governments (Roger L. Kemp) 3. NACo Members Zero In on Cybersecurity, Tech Safety (Ariel Cohen) 4. Growing Impact of Cybercrime in Local Government (Gerald Cliff) 5. Cybersecurity: What’s Your Risk? (International City/County Management Association) 6. Performance and Data Analytics: The Cincinnati Story (Harry Black) 7. The Digital Solution (Shaun Mulholland) 8. Digital Wallpapers Open Doors (Caitlin Cowart) 9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke “Fantasy World” (Fred H. Cate) Part II. Threats and Risks 10. IoT Is Changing the Cybersecurity Industry (Larry Karisny) 11. Equifax Breach Is a Reminder of Society’s Larger Cybersecurity Problems (Richard Forno) 12. Cybersecurity: Protecting Court Data (Brian McLaughlin) 13. Health-Care Industry Increasingly Faces Cybersecurity Breaches (Margaret Steen) 14. It’s in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach (Elana Gordon) 15. Explainer: What Is Hacking? (James H. ­Hamlyn-Harris) 16. How the Chinese Cyberthreat Has Evolved (Dorothy Denning) 17. Now That Russia Has Apparently Hacked America’s Grid, Shoring Up Security Is More Important Than Ever (Theodore J. Kury) 18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement Federal Bureau of Investigation 19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face (Mary Scott Nabers) 20. Ransomware Attacks on the Rise in 2017 (Mary Ann Barton) 21. The Two Faces of Social Media (Martha Perego) 22. “Zero-Day” Stockpiling Puts Us All at Risk (Benjamin Dean) Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures 23. A Plan for Cybersecurity (Cory Fleming) 24. How We Can Each Fight Cybercrime with Smarter Habits (Arun Vishwanath) 25. Simple Steps to Online Safety (Alan Shark) 26. Staying Safe on Social Networking Sites (U.S. Computer Emergency Readiness Team) 27. Seven Keys to Strengthen Your Cybersecurity Culture (Daniel J. Lohrmann) 28. Three Tips for Forming a Computer Emergency (Response Team Kelsey Brewer) 29. Cybersecurity Strategies Governments Need (Gus “Ira” Hunt and Lalit Ahluwalia) 30. Security Pros Need a Mentor: Here’s Why and How (Daniel J. Lohrmann) 31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers (Mary Ann Barton) 32. Fighting Fake News (Marcus Banks) 33. How Airplane Crash Investigations Can Improve Cybersecurity (Scott Shackelford) III. B. Technical Protections 34. National Cybersecurity Workforce Framework U.S. Department of Homeland Security 35. Eliminating Network Blind Spots and Preventing Breaches Reggie Best 36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field (Microsoft) 37. Government Data in the Cloud: Provider and User Responsibilities (Subrata Chakrabarti) 38. Using Blockchain to Secure the “Internet of Things” (Nir Kshetri) 39. How to Protect Patrons’ Digital Privacy (Anne Ford) 40. Monitoring Employees’ Use of Company Computers and the Internet (Texas Workforce Commission) 41. Disaster Recovery for Technology: Best Practice Government Finance Officers Association III. C. Using Partnerships and Networks 42. Cybersecurity Partnerships: Strength in Numbers (Susan Miller) 43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity Intersector Project 44. Obama’s Cybersecurity Initiative (Frank J. Cilluffo and Sharon L. Cardash) 45. New Trump Executive Order on Cybersecurity (Daniel J. Lohrmann) 46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government (Office of the Director of National Intelligence and Other Agencies) 47. Law Enforcement Partnerships Enhance Cybersecurity Investigations (Chelsea Binns) 48. States Rush to Cash in on Cybersecurity Boom (Elaine S. Povich) 49. How the National Guard Is Protecting Cybersecurity (Colin Wood) 50. Cybersecurity and Local Governments in the United States (William Hatcher) Part IV. Future 51. The Top 18 Security Predictions for 2018 (Daniel J. Lohrmann) 52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? (Jeremy Straub) 53. FCC Group on 5G Deployment Short on Local Input (Mary Ann Barton) 54. Thinking Strategically in the Cyber Domain (John ­O’Brien) 55. Internet, ­E-mail and Computer Use Policy (Texas Workforce Commission) 56. Consumers Who Froze Their Credit Reports Julie Appleby Appendix A: Glossary of Cybersecurity Terms Joaquin Jay Gonzalez III Appendix B: Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Appendix C: City and County of San Francisco Cybersecurity Policy Appendix D: LaPorte County, Indiana, IT Computer Security Policy About the Contributors Index

About the Author :
Joaquin Jay Gonzalez III, Ph.D., is vice provost for global affairs as well as chair and Mayor George Christopher Professor of Public Administration at Golden Gate University. He founded GGU’s law enforcement and security program and is a San Francisco advocate for the safety and security of Filipino American kids and their families. Roger L. Kemp, Ph.D., ICMA-CM, has been a city manager on both the East and West coasts for more than 25 years. He is presently Distinguished Adjunct Professor of Public Administration at Golden Gate University and a Fellow of The Academy of Political Science.

Review :
“The 56 separately authored articles contained in this volume effectively combine diverse resources under one cover, making it easier for those new to the cybersecurity discipline to find information relevant to their area of interest...the articles are relevant and informative...recommended”—Choice; “essential reading...recommended”—Midwest Book Review.


Best Sellers


Product Details
  • ISBN-13: 9781476674407
  • Publisher: McFarland & Co Inc
  • Publisher Imprint: McFarland & Co Inc
  • Height: 229 mm
  • No of Pages: 288
  • Returnable: Y
  • Sub Title: Current Writings on Threats and Protection
  • Width: 152 mm
  • ISBN-10: 147667440X
  • Publisher Date: 05 Feb 2019
  • Binding: Paperback
  • Language: English
  • No of Pages: 288
  • Spine Width: 15 mm
  • Weight: 480 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity: Current Writings on Threats and Protection
McFarland & Co Inc -
Cybersecurity: Current Writings on Threats and Protection
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity: Current Writings on Threats and Protection

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!