Amazon Price: N/A (as of December 11, 2017 08:30 –
The rise of sophisticated cyber threats means that the task of managing cyber risks, once the near-exclusive realm of IT professionals, is now also borne by attorneys, senior executives, and directors. Cybersecurity: A Practical Guide to the Law of Cyber Risk provides the practical steps that can be taken to help your clients understand and mitigate today’s cyber risk and to build the most resilient response capabilities possible.
Cybersecurity: A Practical Guide to the Law of Cyber Risk provides a comprehensive discussion of the complex quilt of federal and state statutes, Executive Orders, regulations, contractual norms, and ambiguous tort duties that can apply to this crucial new area of the law. For example, it describes in detail:The leading regulatory role the Federal Trade Commission has played, acting on its authority to regulate unfair or deceptive trade practices;The guidance issued by the SEC interpreting existing disclosure rules to require registrants to disclose cybersecurity risks under certain circumstances;The varying roles of other regulators in sector-specific regulation, such as healthcare, energy, and transportation; andThe impact of preexisting statutes, such as the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act, on current cybersecurity issues.
Continue reading “Cybersecurity: A Practical Guide to the Law of Cyber Risk: 1”
Amazon Price: $20.00 $20.00 (as of December 11, 2017 09:32 –
Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.
Amazon Price: N/A (as of August 6, 2017 17:42 –
Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology–learn how attackers can get in and stay in for years, without detection.
Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers.
Continue reading “Rootkits: Subverting the Windows Kernel”
Amazon Price: $49.95 $38.47 You save: $11.48 (23%). (as of December 11, 2017 17:31 –
Every day, over half a billion iOS users blindly entrust mobile devices with their personal information. If you write an application that mishandles that information, you'll create a goldmine for attackers—and a catastrophe for you and your customers. Whether you develop iOS apps or test their defenses, it's critical that you know how to track down and eliminate security threats before they become real issues.
In iOS Application Security, author David Thiel shows you how to write apps that actually protect users from the bad guys. He covers everything you need to know to design secure iOS apps from the ground up, including:
Continue reading “iOS Application Security: The Definitive Guide for Hackers and Developers”
Amazon Price: $103.00 $51.50 You save: $51.50 (50%). (as of December 11, 2017 03:16 –
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law–the law affecting information and communication technology (ICT)–in Argentina covers every aspect of the subject, including intellectual property rights in the ICT sector, relevant competition rules, drafting and negotiating ICT-related contracts, electronic transactions, privacy issues, and computer crime. Lawyers who handle transnational matters will appreciate the detailed explanation of specific characteristics of practice and procedure.
Following a general introduction, the book assembles its information and guidance in seven main areas of practice: the regulatory framework of the electronic communications market; software protection, legal protection of databases or chips, and other intellectual property matters; contracts with regard to software licensing and network services, with special attention to case law in this area; rules with regard to electronic evidence, regulation of electronic signatures, electronic banking, and electronic commerce; specific laws and regulations with respect to the liability of network operators and service providers and related product liability; protection of individual persons in the context of the processing of personal data and confidentiality; and the application of substantive criminal law in the area of ICT.
Continue reading “Cyber Law in Argentina”