You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Web-based connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how many problems there are with cybersecurity. Despite the passage of many data security laws, data breaches are increasingat a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on cybersecurity and privacy issues, argue that the law fails because, ironically, it focuses too much on the breach itself.Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented through inexpensive, non-cumbersome means. ...
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the ...
Named One of 7 Best Nonfiction Books of the Fall by Kirkus Reviews Andy Borowitz, “one of the funniest people in America” (CBS Sunday Morning), brilliantly examines the intellectual deterioration of American politics, from Ronald Reagan to Dan Quayle, from George W. Bush to Sarah Palin, to its apotheosis in Donald J. Trump. The winner of the first-ever National Press Club award for humor, Andy Borowitz has been called a “Swiftian satirist” (The Wall Street Journal) and “one of the country’s finest satirists” (The New York Times). Millions of fans and New Yorker readers enjoy his satirical news column “The Borowitz Report.” Now, in Profiles in Ignorance, he offers a witty, s...
There is warfare, and there is cyberwarfare. In today's technologically-driven world, governments, and even terrorist groups and hacktivists, engage in cyberwarfare to attack or disrupt the operations of other nations and organizations. Recent revelations about cyberattacks that threatened individual and national security have caused ripples of concern and outrage, but tend to die down quickly. How safe are we, and do we take security for granted? This resource offers a diverse selection of viewpoints from the top voices in the field to enlighten readers about warfare in the Information Age.
This is the first publication by the Journal of Law and Technology at Texas (JOLTT). JOLTT is committed to exploring the vast impact technology has on the policies and practice of law. Our goal is to gather articles, host events, and bring speakers which serve to illuminate the changing legal landscape. This first volume includes topics such as autonomous vehicles, cybersecurity, privacy reform, autonomous surgery, and the immunity of Internet intermediaries. Thank you for your support. You can reach us on social media or visit our website at http: //jolttx.com/
A medieval Islam historian’s incisive portrait of ISIS, revealing the group’s deep ideological and intellectual roots in the earliest days of Islam With tremendous speed, the Islamic State has moved from the margins to the center of life in the Middle East. Despite recent setbacks, its ability to conquer and retain huge swaths of territory has demonstrated its skillful tactical maneuvering, ambition, and staying power. Yet we still know too little about ISIS, particularly about its deeper ideology. In this eye-opening book, David J. Wasserstein offers a penetrating analysis of the movement, looking closely at the thousand-year-old form of Islamic apocalyptic messianism the group draws upon today. He shows how ISIS is not only a military and political movement but also, and primarily, a religious one with a coherent worldview, a patent strategy, and a clear goal: the re-creation of a medieval caliphate. Connecting the group’s day-to-day activities and the writings and sayings of its leaders with the medieval Islamic past, Wasserstein provides an insightful and unprecedented perspective on the origins and aspirations of the Islamic State.
Digital technology is advancing all the time, and how we pay for things is getting high tech, too. Instead of paper money and coins, or even credit and debit cards, this book introduces Bitcoins, a currency made up of bits and bytes. Readers will learn the essentials about Bitcoins, the sometimes-turbulent history of this open source currency, as well as examples of how it is used and when it has the most practical value. This intriguing resource reviews some of Bitcoins' pros and cons and discusses the future of this fascinating financial tool.
American business is dysfunctional. Companies of all sizes follow the mistaken belief that their products and services are best sold through mega-customers with pervasive market reach, such as Amazon and Walmart. Far too many business leaders fail to realize—until it is too late—that the relentless pursuit of volume at all cost is not the key to long-term profits and success. The Customer Trap: How to Avoid the Biggest Mistake in Business is Thomas and Wilkinson’s sequel to The Distribution Trap: Keeping Your Innovations from Becoming Commodities, which won the Berry-American Marketing Association Prize for the best marketing book of 2010. The Distribution Trap contended that cracking ...
Computers can be powerful tools for creating positive change, but in the wrong hands, they can also be destructive weapons. Cybercrime is a growing field of criminal activity, and it is important for readers to know as much as possible about it to avoid becoming a victim. Readers learn valuable information through detailed main text, fact boxes, and helpful sidebars. They also discover what they can do now to prepare for an exciting career investigating cybercriminals. Full-color photographs are included to show readers the technological advances used to combat the many forms of cybercrime—from sextortion to cyberterrorism.
This compact, highly engaging book examines the international legal regulation of both the conduct of States among themselves and conduct towards individuals, in relation to the use of cyberspace. Chapters introduce the perspectives of various stakeholders and the challenges for international law. The author discusses State responsibility and key cyberspace rights issues, and takes a detailed look at cyber warfare, espionage, crime and terrorism. The work also covers the situation of non-State actors and quasi-State actors (such as IS, or ISIS, or ISIL) and concludes with a consideration of future prospects for the international law of cyberspace. Readers may explore international rules in t...