BIBLIOGRAPHY

In preparing for this book, the sequel to Cybersecurity Program Development for Business: The Essential Planning Guide (Wiley 2018), I have consulted with, attended, read, and visited thousands of primary sources, be they in the form of books, seminars, workshops, classes, conferences, vendors, or cybersecurity professionals of every specialty that you can imagine (and some that you cannot!). It is—clearly—impossible to list all the material that I consulted and influenced my thinking, and I therefore apologize in advance for any omissions from the following bibliography.

The bibliography is first organized topically, followed by selected bibliography from Cybersecurity Program Development for Business: The Essential Planning Guide, whose material has been used extensively throughout the cybersecurity part of this book.

History, Case Law, and Legal Analysis

  1. Abigail M. Roberson, an Infant, by Margaret E. Bell, her Guardian ad Litem, Respondent, v. The Rochester Folding Box Company et al., Appellants. Court of Appeals of New York, 171 N.Y. 538; 64 N.E. 442; 1902 N.Y. LEXIS 881, February 13, 1902, Argued June 27, 1902, Decided.
  2. Cohen, Julie E. “What Privacy Is For.” 126 Harvard Law Review, 1904. May 20, 2013. https://harvardlawreview.org/2013/05/what-privacy-is-for/.
  3. Cooley, Thomas McIntyre. A Treatise on the Law of Torts: Or the Wrongs which Arise Independent of Contract. Second Edition. Chicago: Callaghan, 1888.
  4. DeCew, Judith. “Privacy.” The Stanford Encyclopedia ...

Get Privacy, Regulations, and Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.