Title Cybersecurity
Subtitle Current Writings on Threats and Protection
Author Joaquin Jay Gonzalez III, Roger L. Kemp
ISBN 9781476674407
List price USD 39.95
Price outside India Available on Request
Original price
Binding Paperback
No of pages 288
Book size 153 x 229 mm
Publishing year 2019
Original publisher McFarland (Eurospan Group)
Published in India by .
Exclusive distributors Viva Books Private Limited
Sales territory India, Sri Lanka, Bangladesh, Pakistan, Nepal, .
Status New Arrival
About the book Send Enquiry


“The 56 separately authored articles contained in this volume effectively combine diverse resources under one cover, making it easier for those new to the cybersecurity discipline to find information relevant to their area of interest. …the articles are relevant and informative…recommended”

“Essential reading…recommended”
Midwest Book Review


Billions of people are connected through billions of devices across the globe. In the age of this massive internet, professional and personal information is being transmitted and received constantly, and while this access is convenient, it comes at a risk.

This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations.





Part I. An Overview

Chapter 1. Government Employees Unaware They Are Cyber Crime Victims (Chelsea Binns)

Chapter 2. Cybersecurity and America’s Governments (Roger L. Kemp)

Chapter 3. NACo Members Zero In on Cybersecurity, Tech Safety (Ariel Cohen)

Chapter 4. Growing Impact of Cybercrime in Local Government (Gerald Cliff)

Chapter 5. Cybersecurity: What’s Your Risk? (International City/County Management Association)

Chapter 6. Performance and Data Analytics: The Cincinnati Story (Harry Black)

Chapter 7. The Digital Solution (Shaun Mulholland)

Chapter 8. Digital Wallpapers Open Doors (Caitlin Cowart)

Chapter 9. Personal Privacy Is Eroding as Consent Policies of Google and Facebook Evoke “Fantasy World” (Fred H. Cate)


Part II. Threats and Risks

Chapter 10. IoT Is Changing the Cybersecurity Industry (Larry Karisny)

Chapter 11. Equifax Breach Is a Reminder of Society’s Larger Cybersecurity Problems (Richard Forno)

Chapter 12. Cybersecurity: Protecting Court Data (Brian McLaughlin)

Chapter 13. Health-Care Industry Increasingly Faces Cybersecurity Breaches (Margaret Steen)

Chapter 14. It’s in the Mail: Aetna Agrees to $17M Payout in HIV Privacy Breach (Elana Gordon)

Chapter 15. Explainer: What Is Hacking? (James H. ­Hamlyn-Harris)

Chapter 16. How the Chinese Cyberthreat Has Evolved (Dorothy Denning)

Chapter 17. Now That Russia Has Apparently Hacked America’s Grid, Shoring Up Security Is More Important Than Ever (Theodore J. Kury)

Chapter 18. Ransomware Victims Urged to Report Infections to Federal Law Enforcement (Federal Bureau of Investigation)

Chapter 19. Ransomware Attacks Illustrate the Vulnerabilities That Local Government Entities Face (Mary Scott Nabers)

Chapter 20. Ransomware Attacks on the Rise in 2017 (Mary Ann Barton)

Chapter 21. The Two Faces of Social Media (Martha Perego)

Chapter 22. “Zero-Day” Stockpiling Puts Us All at Risk (Benjamin Dean)


Part III. Prevention, Protection, Partnership
A. Practical Preventive Measures

Chapter 23. A Plan for Cybersecurity (Cory Fleming)

Chapter 24. How We Can Each Fight Cybercrime with Smarter Habits (Arun Vishwanath)

Chapter 25. Simple Steps to Online Safety (Alan Shark)

Chapter 26. Staying Safe on Social Networking Sites (U.S. Computer Emergency Readiness Team)

Chapter 27. Seven Keys to Strengthen Your Cybersecurity Culture (Daniel J. Lohrmann)

Chapter 28. Three Tips for Forming a Computer Emergency Response Team (Kelsey Brewer)

Chapter 29. Cybersecurity Strategies Governments Need (Gus “Ira” Hunt and Lalit Ahluwalia)

Chapter 30. Security Pros Need a Mentor: Here’s Why and How (Daniel J. Lohrmann)

Chapter 31. Mecklenburg County Refuses to Pay Ransom to Cyber Hackers (Mary Ann Barton)

Chapter 32. Fighting Fake News (Marcus Banks)

Chapter 33. How Airplane Crash Investigations Can Improve Cybersecurity (Scott Shackelford)

III. B. Technical Protections

Chapter 34. National Cybersecurity Workforce Framework (U.S. Department of Homeland Security)

Chapter 35. Eliminating Network Blind Spots and Preventing Breaches (Reggie Best)

Chapter 36. The Cloud and Enterprise Cybersecurity: Leveling the Playing Field (Microsoft)

Chapter 37. Government Data in the Cloud: Provider and User Responsibilities (Subrata Chakrabarti)

Chapter 38. Using Blockchain to Secure the “Internet of Things” (Nir Kshetri)

Chapter 39. How to Protect Patrons’ Digital Privacy (Anne Ford)

Chapter 40. Monitoring Employees’ Use of Company Computers and the Internet (Texas Workforce Commission)

Chapter 41. Disaster Recovery for Technology: Best Practice (Government Finance Officers Association)

III. C. Using Partnerships and Networks

Chapter 42. Cybersecurity Partnerships: Strength in Numbers (Susan Miller)

Chapter 43. Intersector Briefing: Cross Sector Collaboration in Cybersecurity (Intersector Project)

Chapter 44. Obama’s Cybersecurity Initiative (Frank J. Cilluffo and Sharon L. Cardash)

Chapter 45. New Trump Executive Order on Cybersecurity (Daniel J. Lohrmann)

Chapter 46. Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government (Office of the Director of National Intelligence and Other Agencies)

Chapter 47. Law Enforcement Partnerships Enhance Cybersecurity Investigations (Chelsea Binns)

Chapter 48. States Rush to Cash in on Cybersecurity Boom (Elaine S. Povich)

Chapter 49. How the National Guard Is Protecting Cybersecurity (Colin Wood)

Chapter 50. Cybersecurity and Local Governments in the United States (William Hatcher)


Part IV. Future

Chapter 51. The Top 18 Security Predictions for 2018 (Daniel J. Lohrmann)

Chapter 52. Artificial Intelligence Cyber Attacks Are Coming—But What Does That Mean? (Jeremy Straub)

Chapter 53. FCC Group on 5G Deployment Short on Local Input (Mary Ann Barton)

Chapter 54. Thinking Strategically in the Cyber Domain (John ­O’Brien)

Chapter 55. Internet, ­E-mail and Computer Use Policy (Texas Workforce Commission)

Chapter 56. Consumers Who Froze Their Credit Reports (Julie Appleby)


Appendix A: Glossary of Cybersecurity Terms (Joaquin Jay Gonzalez III)

Appendix B: Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Appendix C: City and County of San Francisco Cybersecurity Policy

Appendix D: LaPorte County, Indiana, IT Computer Security Policy


About the Contributors


About the Editors:

Joaquin Jay Gonzalez III, Ph.D., is a professor of public and business administration at Golden Gate University and an adjunct professor at the University of San Francisco and San Francisco State. The former dean of Heald College’s School of Business and Technology, he has a Security Awareness Certificate from hacker Kevin Mitnick’s program.

Roger L. Kemp, Ph.D., ICMA-CM, has been a city manager on both the East and West coasts for more than 25 years and holds International City/County Management Association credentials. He has taught at the University of California, Rutgers, University of New Haven, University of Connecticut and Golden Gate University.

Target Audience:

This book of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Useful for people interested in cybersecurity & information science and technology.


Special prices are applicable to the authorised sales territory only.
Prices are subject to change without prior notice.