India has emerged as a hub of the IT industry due to the phenomenal growth of the IT sector. However, this huge growth rate has brought with it the inevitable legal complications due to a switch over from paper-based commercial transactions to e-commerce and e-transactions. This book discusses the legal position of Information Technology (IT), e-commerce and business transaction on the cyberspace/Internet under the Information Technology (IT) Act in India, 2000 and as amended in 2008. Divided into five parts, Part I of the text deals with the role of the Internet, e-commerce and e-governance in the free market economy. Part II elaborates on various laws relating to electronic records and intellectual property rights with special reference to India. Efforts are being made internationally to rein in cyber crimes by introducing stringent laws, Part III deals with various rules and regulations which have been introduced to get rid of cyber crimes. Part IV is devoted to a discussion on various offences committed under the IT Act, penalties imposed on the offenders, and compensations awarded to the victims. Finally, Part V acquaints the students with the miscellaneous provisions of the IT Act. This book is designed as text for postgraduate students of Law (LLM) and undergraduate and postgraduate students of Information Technology EB.Tech./M.Tech. (IT)] and for Master of Computer Applications (MCA) wherever it is offered as a course. Besides, it will prove handy for scholars and researchers working in the field of IT and Internet.
Circles is the most popular social network in the world: vast, ubiquitous, and constantly evolving. Days before expanding into China, Circles suffers a devastating cyberattack—and a key executive is brutally murdered.
As he fights to save the company he helped build, top engineer Sergio Mansour uncovers evidence of a massive conspiracy that turns the power of Circles against its users. But as Sergio investigates, someone is watching his every move—someone ruthless enough to brand him a criminal and set a vicious hit man on his trail.
Anticipating Surprise, originally written as a manual for training intelligence analysts during the Cold War, has been declassified and condensed to provide wider audiences with an inside look at intelligence gathering and analysis for strategic warning. Cynthia Grabo defines the essential steps in the warning process, examines distinctive ingredients of the analytic method of intelligence gathering, and discusses the guidelines for assessing the meaning of gathered information. Since the September 11, 2001 terrorist attacks on America, intelligence collection and analysis has been hotly debated. In this book, Grabo suggests ways of improving warning assessments that better convey warnings to policymakers and military commanders who are responsible for taking appropriate action to avert disaster.
"Hardware, says Bunnie Huang, is a world without secrets: if you go deep enough, even the most important key is expressed in silicon or fuses. His is a world without mysteries, only unexplored spaces. This is a look inside a mind without peer."—Edward Snowden
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.
Continue reading “The Hardware Hacker: Adventures in Making and Breaking Hardware”