|
|
|
Item Details
Title:
|
MANAGING LEGAL AND SECURITY RISKS IN COMPUTERS AND COMMUNICATIONS
|
By: |
Paul Shaw |
Format: |
Paperback |
List price:
|
£41.50 |
We currently do not stock this item, please contact the publisher directly for
further information.
|
|
|
|
|
ISBN 10: |
0750699388 |
ISBN 13: |
9780750699389 |
Publisher: |
ELSEVIER SCIENCE & TECHNOLOGY |
Pub. date: |
6 January, 1998 |
Pages: |
256 |
Description: |
Written for professionals who are responsible for the protection of systems such as computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. This guide to computer-related crime helps you quickly locate pertinent laws, and provide guidance on the laws. |
Synopsis: |
The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations. Managing Legal and Security Risks in Computing and Communications will: Help you quickly locate pertinent lawsProvide guidance on the lawsPresent a legal reference for developing training materialHelp you foster a continuing dialog with legal counsel |
Publication: |
UK |
Imprint: |
Butterworth-Heinemann Ltd |
Returns: |
Non-returnable |
|
|
|
|
Ramadan and Eid al-Fitr
A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
|
|
|
|
|
|
|
|
|
|
|