The first completely new Merritt Manual in more than five years, this state-of-the-art technical reference gives you a 360-degree perspective on cyber risks and how to identify, manage and insure them. Click here to order.

Long-time Merritt Manual contributors and editors combine their expertise with recommendations and advice from professionals from the IT, legal and online-commerce worlds. The result provides background and insight on how to handle the fastest-growing area of enterprise risk management. This is more than a few chapters from a book. Or a collection of news articles. It’s an in-depth discussion of technical risks—and how you can prevent them, control them or transfer them. The recommended retail price for this new Merritt Manual is $419.95. But, as part of this direct-from-the-publisher introductory offer, you can buy the charter edition of the Merritt Cyber Risk Management Manual for only $199.95 . That’s more than 50 percent off…and the best price you’ll see anywhere. Click here to order.

Here’s the Merritt Cyber Risk Management Manual ’s Table of Contents: Introduction

Privacy, Security and Risk in Cyberspace Part One: The Mechanics of Cyber Security

Chapter 1: Online and Internet Risks

Chapter 2: Who Can Look at Personal Information

Chapter 3: Phones

Chapter 4: Hackers

Chapter 5: Phishing

Chapter 6: Spoofing

Chapter 7: Spam

Chapter 8: Spyware

Chapter 9: Cameras, GPS, RFIDs and Tracking Devices

Chapter 10: Privacy on the Internet

Chapter 11: Telephone Privacy

Chapter 12: Chat Rooms and Instant Messaging

Chapter 13: The Cloud…and Physical Devices Part Two: Identity Theft

Chapter 14: Why ID Theft Remains Such a Problem

Chapter 15: The Problems Caused By Existing ID Tools

Chapter 16: The Mechanics of ID Theft

Chapter 17: Securing Personal Data

Chapter 18: Protecting People’s Identities

Chapter 19: Insuring against Identity Theft Part Three: Human Factors/The Psychology of Cyber Security

Chapter 20: What Is Security Online and in Cyberspace?

Chapter 21: Trouble Can Happen to You…No Matter Who You Are

Chapter 22: Family and Household Issues

Chapter 23: Online Commerce, Auction and eBay Frauds

Chapter 24: How Thieves and Predators Stalk Their Prey

Chapter 25: Selfishness, Desperation and Vanity

Chapter 26: Cyber Criminals Like to Move Fast

Chapter 27: Thieves and Predators Groom Their Victims

Chapter 28: The Internet Warps Peoples’ Perspectives Part Four: Banks, Financial Institutions and Personal Financial Information

Chapter 29: Financial Planning Security in the Internet Age

Chapter 30: Financial Frauds and Swindles

Chapter 31: How Online Commerce Affects Credit Scores and Ratings

Chapter 32: Dealing with Banks and Credit Bureaus in Cyberspace

Chapter 33: Data Mining

Chapter 34: Data Brokers

Chapter 35: Online Banking & Privacy

Chapter 36: Investment, Business and Banking Scams

Chapter 37: Mortgage Frauds in Cyberspace Part Five: Health and Medical Information

Chapter 38: Medical Privacy & HIPAA

Chapter 39: Medical ID Theft

Chapter 40: Moving toward Online Medical Records

Chapter 41: How the ACA and Other Laws Affect Personal Medical Data Part Six: Small Businesses and Cyber Risks

Chapter 42: Business Formation and Partnership Agreements in Cyberspace

Chapter 43: Leases, Landlords and Contracts with Parties You’ll Never Meet

Chapter 44: Virtual Workers, Leased Employees and Contractors

Chapter 44: Insurance for Business Cyber Risks

Chapter 45: Computer Networks, Hardware and E-Commerce

Chapter 46: Privacy in the Virtual Workplace

Chapter 47: Intellectual Property Assets and Rights Part Seven: Sex, Stalkers and Personal Cyber Risks

Chapter 48: Cyberbullies

Chapter 49: Pornography, Internet Sex and Related Risks

Chapter 50: Dating Sites, Russian Brides and Sweetheart Scams

Chapter 51: Cyberstalkers

Chapter 52: Families, Children & Privacy Online

Chapter 53: Buildings Barriers in a Cyber World/Some People Invite Trouble Part Eight: What the Government Can—and Can’t—Do

Chapter 54: Laws and Governmrnt Agencies that Protect You…or Don’t

Chapter 55: Privacy & Government Actions

Chapter 56: What Federal, State and Local Law Can—and Can’t—Do

Chapter 57: How the Law Responds

Chapter 58: Legal Bureaucracies

Chapter 59: Questions of Jurisdiction Part Nine: Terrorists and Political Risks

Chapter 60: Terrorism in Cyberspace

Chapter 61: Hacking as an Act of War

Chapter 62: Management of Political Risks Online

Chapter 63: How to Manage Asymmetrical Risks

Chapter 64: When Cyber Risks Cross into the Physical World Part Ten: Prevention, Insurance and Hardening Targets

Chapter 65: Managing Hard-to-Insure Risks

Chapter 66: Managing Online and Computer Crime Risks

Chapter 67: Red Flags and Black Marks

Chapter 68: Prevention

Chapter 69: Changing Enterprise Cultures and Employee Lifestyles

Chapter 70: What You Can Do…. Conclusion

Cyber Security Is a Mind-set As part of this direct-from-the-publisher introductory offer, you can buy the charter edition of the Merritt Cyber Risk Management Manual for only $199.95 . That’s more than 50 percent off the standard retail price.. Click here to order.