The First Amendment - A Picture Is Worth 1000 Words, Two Pictures, 2000 Words
CONSTITUTION OF THE UNITED STATES OF AMERICA, PROPOSED BY CONGRESS, AND RATIFIED BY THE LEGISLATURES OF THE SEVERAL STATES, PURSUANT TO THE FIFTH ARTICLE OF THE ORIGINAL CONSTITUTION
Article [I.]
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
References
Ballard, Spahr, Andrews, Ingersoll, LLC. (2004) Privacy
Law. [Electronic version.] Retrieved from the web on May 14, 2004 at http://www.virtualchase.com/resources/privacy.html.
Brancik, K. C. (2008). Insider
Computer Fraud: An In-depth Framework for Detecting and Defending Against
Insider IT Attacks. Boca Raton, FL: Auerbach Publications.
Davis, C.; Schiller, M.; and
Wheeler, K. (2007). IT Auditing: Using Controls to Protect Information Assets.
New York, NY: Osborne McGraw Hill.
Department of Homeland Security.
(2009). (U//FOUO) Rightwing Extremism: Current Economic and Political Climate
Fueling Resurgence in Radicalization and Recruitment. Retrieved from the web at
http://www.fas.org/irp/eprint/rightwing.pdf
on December 24, 2011.
Department of Justice (2004). USA PATRIOT Act at Work. Retrieved from the web at
http://www.justice.gov/olp/pdf/patriot_report_from_the_field0704.pdf on December 24, 2011.
Doyle, C. (2002).
USA PATRIOT Act: A sketch.
Retrieved from the web at http://www.fas.org/irp/crs/RS21203.pdf on December 24, 2011.
Doyle, C. (2010).
National Security Letters in Foreign Intelligence Investigations: A
Glimpse of the Legal Background and Recent Amendments - a CRS Report Dated
December 27, 2010. Retrieved from the
web at http://www.fas.org/sgp/crs/intel/RS22406.pdf on December 24, 2011.
Electronic Privacy and Information Center Resources about
the USA PATRIOT Act http://epic.org/privacy/terrorism/usapatriot/
.
EPIC. (2011). Information Related to the USA PATRIOT Act.
Retreived from the web at http://epic.org/privacy/terrorism/usapatriot/
on December 9, 2011.
Frackman, A., Martin, R., and Ray,
C. (2002). Internet and Online Privacy: A Legal and Business Guide. New York:
ALM Publishing.
Galik, D. (1998). Defense in Depth:
Security for Network-Centric Warfare. [Electronic version] Retrieved from the
web on May 11, 2004 from http://www.chips.navy.mil/archives/98_apr/Galik.htm.
Gaskin, J. (1997). Corporate
Politics and the Internet: Connection Without Controversy. Upper Saddle River,
NJ: Prentice Hall.
Herrmann, D. S. (2007). Complete
Guide to Security and Privacy Metrics: Measuring Regulatory Compliance,
Operational Resilience, and ROI. Boca Raton, FL: Auerbach Publications.
Hoffman, L. J. (1977). Modern Methods
for Computer Security and Privacy. Englewood Cliffs, NJ: Prentice-Hall.
Icove, D., et al. (1995). Computer
Crime: A Crimefighter’s Handbook. Sebastopol, CA: O’Reilly & Associates.
Jacobs, S. (2011). Engineering
Information Security: The Application of Systems Engineering Concepts to
Achieve Information Assurance. Piscataway, NJ: IEEE Press.
Landy, G. K. (2008). the IT/Digital
Legal Companion: A Comprehensive Business Guide to Software, IT, Internet,
Media, and IP Law. Burlington, MA:
Syngress.
Lane, C. A. (1997). Naked in Cyberspace. Wilton, CT:
Pemberton, Press.
Legal Information Institute.
(2004). Right of Privacy, An Overview. An article from Cornell Law School.
[Electronic version.] Retrieved from the web on May 14, 2004 at http://www.law.cornell.edu/topics/privacy.html .
McCrie, R. D. (2007). Security
Operations Management, second edition. Burlington, MA: Elsevier.
Miles, G., et al. (2004) Security
Assessment: Case Studies for Implementing the NSA IAM. Burlington, MA: Syngress
Publishing, Inc.
Olsen, J. E. (2003). Data Quality:
The Accuracy Dimension. San Francisco, CA: Morgan Kaufmann Publishers.
Reynolds, G. W. (2012). Ethics in
Information Tehnology, 4th edition. Boston, MA: Course Technology.
Riggs, M. (2011). Lee County Deputies Tied Suspect to a Chair,
Gagged Him, and Pepper-Sprayed Him to Death.
An article published at Reason.com on December 23, 2011. Retrieved from
the web at http://reason.com/blog/2011/12/23/lee-county-deputies-tied-suspect-to-a-ch
on December 23, 2011.
Senft, A. and Gallegos, F. (2009). Information Technology
Control and Audit. Bocan Raton, FL: CRC Press.
The White House. (2009). Cyberspace Policy Review. A
document published by the Obama Administration. Retrieved from the web at http://info.publicintelligence.net/cyberspace_policy_review_final.pdf on December 9, 2011.
ThinkExist.com. (2011).
Benjamin Franklin Quotes. Retrieved
from the web at http://thinkexist.com/quotation/those_who_desire_to_give_up_freedom_in_order_to/12888.html
on December 30, 2011.
U.S. Congress. (1987). The Computer
Security Act of 1987. 101 STAT. 1724, Public Law 100-235, 100th Congress.
Retrieved from the web http://www.nist.gov/cfo/legislation/Public%20Law%20100-235.pdf on December 9, 2011.
U.S. Government. (2009). American
Recovery and Reinvestment Act of 2009. 101 STAT. 1724, Public Law 100-235,
100th Congress. Retrieved from the web http://www.opencongress.org/bill/111-s1/show on December 9, 2011.
U.S. Government. (2001).
USA PATRIOT Act. Retrieved from
the web at http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf on December 24, 2011.
U.S. Government. (1776). The Declaration of Independence.
Retrieved from the web at http://www.billslater.com/tj1776.htm on November 6, 2011.
U.S. Government. (1791). U.S. Constitution. Retrieved from
the web at
http://www.billslater.com/wfs_us_constitution.htm on November 6, 2011.
Whitman, M. E and Mattord, H. J. (2010). Management of
Information Security, third edition: Indianapolis, IN: Course Technology.
Wikipedia. (2011). USA PATRIOT Act. A Wikipedia article
retrieved from the web at
http://en.wikipedia.org/wiki/Usa_patriot_act on November 6, 2011.
= = = = = = = = = = = = = = = = = = = = = = =
William Favre Slater, III
William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002,
ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
M.S. in Cybersecurity Program at Bellevue
University
CIS 537 Introduction to Cyber Ethics
CIS 608 Information Security Management
CYBR 515 - Security Architecture and Design
CYBR 510 Physical, Operations, and Personnel
Security
Mastering Security
Career
Certifications
Credentials
ISO 27001
Chicago, IL
United States of America
No comments:
Post a Comment