Internet Law Jurisdiction

Amazon Price: $39.00 (as of December 16, 2018 05:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This casebook explores Internet Law as a coherent if organic whole — integrating the historical sweep of the global Internet’s development with both the opportunities and problems it has brought about. The book is broad and thorough enough to be the primary or sole text for a variety of Internet-related courses, while deep enough to bring students through the important nuances of such doctrinal topics as copyright, privacy and jurisdiction without assuming any particular prior exposure to these subfields

Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

Amazon Price: $24.50 $24.50 (as of December 16, 2018 12:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.

Hate Crimes in Cyberspace

Rating: 
Amazon Price: $18.95 $17.05 You save: $1.90 (10%). (as of December 16, 2018 14:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Some see the internet as a Wild West where those who venture online must be thick-skinned enough to ensure verbal attacks in the name of free speech protection. Danielle Keats Citron rejects this view. Cyber-harassment is a matter of civil rights law, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.

The Black Box Society: The Secret Algorithms That Control Money and Information

Rating: 
Amazon Price: $36.00 $30.13 You save: $5.87 (16%). (as of December 16, 2018 15:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Every day, corporations are connecting the dots about our personal behavior—silently scrutinizing clues left behind by our work habits and Internet use. The data compiled and portraits created are incredibly detailed, to the point of being invasive. But who connects the dots about what firms are doing with this information? The Black Box Society argues that we all need to be able to do so—and to set limits on how big data affects our lives.

Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only scratched the surface of this troubling behavior.
Continue reading “The Black Box Society: The Secret Algorithms That Control Money and Information”

Penetration Testing and Network Defense (Networking Technology)

Rating: 
Amazon Price: N/A (as of December 16, 2018 04:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks

Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Continue reading “Penetration Testing and Network Defense (Networking Technology)”