Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
COVER TABLE OF CONTENTS TITLE PAGE COPYRIGHT FOREWORD PREFACE ABOUT THE AUTHOR ACKNOWLEDGMENTS PART ONE: Privacy
CHAPTER 1: Understanding Privacy CHAPTER 2: A (Very) Brief History of Privacy
The Legal Case for Privacy (the Big Print) Slouching toward Privacy Debating Privacy in the US Confidentiality vs. Privacy
CHAPTER 3: The Legal Case for Privacy (the Finer Print)
International Privacy Legislation
PART TWO: Regulations
CHAPTER 4: Introduction to Regulations
Preparing to Take Charge Creating Your Privacy Profile Know before You Go: Using the Regulations Section One Last Thing before We Go!
CHAPTER 5: North American Regulations
United States Federal Regulations State Regulations California Maine Amendment to the Nevada Privacy of Information Collected on the Internet from Consumers Act via SB 220 Data Protection in the United States: Conclusions Canada Mexico
CHAPTER 6: European Regulations
Non-EU Member European Countries Russia Switzerland Coming Soon to a European Union Near You!
CHAPTER 7: Asia-Pacific Regulations
China India Japan Australia
CHAPTER 8: African Regulations
Economic Community of West African States Nigeria South Africa Egypt
CHAPTER 9: South American Regulations
Brazil Argentina Colombia
PART THREE: Privacy and Cybersecurity
CHAPTER 10: Introduction to Cybersecurity
Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) In the Beginning1… Key Definitions Note
CHAPTER 11: A Cybersecurity Primer
Cybersecurity Defined Confidentiality Integrity Availability Safety Measuring Cybersecurity's Success Ensuring and Preserving Cybersecurity Controls and Defense in Depth Defense in Depth The Threats Threat Agents Key Trends Influencing Threat Agents The Nature of Hackers Attack Process Types of Attacks A Brief Cyberglossary
CHAPTER 12: Privacy-Centric Cybersecurity Program Overview
What's the Point of It All? Vision and Mission Statements Culture and Strategy Off to See the Wizard What Does Organizational IT Typically Look Like? What's at Risk? Threat Assessment At the Club House Turn! Mitigating Risk Incident Response Planning
CHAPTER 13: Privacy by Design Overview
The Case for Frameworks
CHAPTER 14: Cover Your Assets!
Asset Classification Asset Metadata A Fleeting Glimpse into the Other Side Business Impact Analysis One Spreadsheet to Rule Them All
CHAPTER 15: Threat Assessment
Types of Threats Internal Threats External Threats Threat Rankings Threat Intelligence Threat Modeling
CHAPTER 16: Vulnerabilities
Who's Who in Vulnerabilities Tracking Vulnerabilities: Mapping and Remediation Vulnerability Testing
CHAPTER 17: Environments
On-Premises Computing Environments Private Cloud Computing Environments Public Cloud Computing Environments Hybrid Cloud Computing Environments Cloud Security Questions The Internet of Things (IoT) Distributed Workforces
CHAPTER 18: Controls
Preventative Controls Detective Controls Corrective Controls Compensatory Controls Defense in Depth Privacy and Cybersecurity Controls People, Technology, and Operations Communications Policies, Standards, Procedures, and Guidelines Putting It All Together
CHAPTER 19: Incident Response
Incident Response Planning: Not Just a Good Idea—It's the Law! Incident-Response Plan Phases Preparing Your Incident-Response Plan Identifying Incidents Containing Incidents Treating Incidents Incident Recovery Post-Incident Review Do It All Over Again!
CHAPTER 20: Welcome to the Future! Now, Go Home!
Social Transformation Technology Transformation Business Transformation The Story of ACME Final Words
BIBLIOGRAPHY
History, Case Law, and Legal Analysis Legislation, Regulation, and Analysis Information Technology, Design, and Privacy Threat and Incident Reports Future Trends Selected Bibliography from Cybersecurity Program Development for Business: The Essential Planning Guide (Wiley 2018)
INDEX END USER LICENSE AGREEMENT
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion