Amazon Price: N/A (as of May 25, 2017 02:49 –
Secrets. Lies. Choices.
When a pharmaceutical company hires Brody Taylor, elite hacker and social engineer, to fortify their digital-defences against a Chinese blackhat cyberattack, Brody stumbles across a secret the company strives to keep under wraps.
Amazon Price: $16.00 $16.00 (as of May 24, 2017 23:11 –
Defamation laws protect people from untrue, damaging statements. They provide important recourse for people whose careers, reputations, finances and/or health have been damaged by the harmful statements. However, defamation law often intersects with laws that protect freedom of speech, guaranteed by the Constitution. So, just as it is important to protect people from the harms that untrue statements may cause, it is also important to protect speakers so that they may speak freely without fear of reprisal. Cyber defamation is not a specific criminal offense, misdemeanor or tort, but rather defamation or slander conducted via digital media, usually through the Internet. Penalties for "cyber defamation" vary from country to country, but the fundamental rights covered in the UN Declaration of Human Rights and European Union Fundamental Human Rights. Stopping or addressing defamation can be difficult. If the person has no serious grudge, then a cease and desist letter may stop the behavior and get the statements removed from the Internet. On the other hand, if the person is acting out of spite, it may be necessary to file a complaint with the court depending on local law.
Amazon Price: $16.95 $12.20 You save: $4.75 (28%). (as of May 25, 2017 00:41 –
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict.
In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.
Amazon Price: N/A (as of May 24, 2017 13:54 –
The Silent Intelligence is a book about the Internet of Things phenomenon. In it we talk about the history, trends, technology ecosystem and the future of the Internet of Things, Connected Cities, Connected Homes, Connected Health and Connected Cars. We also discuss the most promising areas for entrepreneurs and venture investors. We share exciting stories and unique opinions of over 30 industry veterans, experts and visionaries from Google, Ericcson, AT&T, Qualcomm, Accenture, SAP, MIT, EcoLife Foundation and many others.
We called this book The Silent Intelligence because most of the activity and growth in the space has so far been happening outside of mainstream visibility. We hope that our book will help executives, entrepreneurs, investors and everybody else better understand the opportunities and challenges of the Internet of Things and will get them as excited about the upcoming possibilities as we are.
Amazon Price: N/A (as of May 24, 2017 15:14 –
Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.