Comprehensive coverageCovers the entire range of best security practices: obtaining senior management commitment, defining information security goals and policies, creating a strategy for monitoring intrusions and compliance, and understanding legal issues. Brings students quickly up to speed on the latest issues in security. Cross-disciplinary textCovers the three properties of information securitytechnical, managerial, and legal. Provides students with a thorough examination of the technologies, managerial issues, and legal risks associated with safeguarding information and privacy. Cases on Point Contained in each chapter; these summarize real-life cases involving information security: theft, hacking, viruses, and more. Provides students with a real-world context for the chapter. Cyberbriefs and LegalBriefs sections throughout the textProvide mini-updates on what's happening in security today. Highlights for students information on security issues, happenings, laws, and more. @lerts Included throughout each chapter, these are brief tips, facts, and warnings. Gives students critical information in a visually interesting manner. Legal language and hacker vocabularyIntroduced throughout the text. Helps students become familiar with the terminology associated with information security, fostering understanding. Extensive reference materialIncludes a comprehensive glossary of technological and legal terms; an index of abbreviations and acronyms; online and traditional references; and the objectives of such legal statutes as the USA PATRIOT Act, Computer Fraud and Abuse Act, and HIPAA. Provides students with a text that can be used as an excellent reference resource in their future careers. Discussion questionsProvided at the end of each chapter. Helps students test their knowledge.