null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Why Don't We Defend Better? (Data Breaches, Risk Management, and Public Policy)

List Price: $76.99
SKU:
9780815356622
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Robert Sloan, Richard Warner
    Format:
    Hardcover
    Pages:
    118
    Publisher:
    CRC Press (July 15, 2019)
    Language:
    English
    ISBN-13:
    9780815356622
    Weight:
    5oz
    Dimensions:
    5.4375" x 8.5"
    File:
    TAYLORFRANCIS-TayFran_260304052351303-20260304.xml
    Folder:
    TAYLORFRANCIS
    List Price:
    $76.99
    Case Pack:
    10
    As low as:
    $73.14
    Publisher Identifier:
    P-CRC
    Discount Code:
    H
    Country of Origin:
    United States
    Pub Discount:
    30
    Imprint:
    CRC Press
  • Overview

    The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations.

    Features

    • Explains why data breach defense is currently often ineffective
    • Shows how to respond to the increasing frequency of data breaches
    • Combines the issues of technology, business and risk management, and legal liability
    • Discusses the different issues faced by large versus small and medium-sized businesses (SMBs)
    • Provides a practical framework in which public policy issues about data breaches can be effectively addressed