The technology likely to have the greatest impact on the future of the world economy has arrived, and it’s not self-driving cars, solar energy, or artificial intelligence.
Best practices for protecting critical data and systems
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.
Continue reading “Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Networking & Comm – OMG)”
'This book provides a detailed and methodical overview of the contemporary contours of cyberspace law. It does a wonderful job explaining the evolution of online copyright law and trademark law issues, and also of predicting future developments. It also provides a clear and handy account of online privacy law, and the speech torts, especially defamation. This updated treatment of essential cyberspace law topics makes an exceptionally useful contribution to the field.'
– Ann Bartow, Pace University School of Law, US
'As one of the long-time leading scholars in the field, Professor Lipton has written a timely reconceptualization of cyberlaw as few others could do. In this comprehensive overview, Professor Lipton presents the nuances of the subject in an accessible manner that will be of interest not only to legal scholars or practitioners specializing in cyberlaw, but to anyone who has reflected on the unique nature of cyberspace and its regulation.'
– Marshall A. Leaffer, Indiana University Maurer School of Law, US
Continue reading “Rethinking Cyberlaw: A New Vision for Internet Law (Rethinking Law series, #2)”
While many books explain the how of bitcoin, The Internet of Money delves into the why of bitcoin. Acclaimed information-security expert and author of Mastering Bitcoin, Andreas M. Antonopoulos examines and contextualizes the significance of bitcoin through a series of essays spanning the exhilarating maturation of this technology.
Bitcoin, a technological breakthrough quietly introduced to the world in 2008, is transforming much more than finance. Bitcoin is disrupting antiquated industries to bring financial independence to billions worldwide. In this book, Andreas explains why bitcoin is a financial and technological evolution with potential far exceeding the label “digital currency.”
Continue reading “The Internet of Money”
Third Edition (2014) Sheds New Light on Open Source Intelligence Collection and Analysis.
Author Michael Bazzell has been well known and respected in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout sixteen chapters of specialized websites, application programming interfaces, and software solutions. Based on his live and online video training at IntelTechniques.com, over 250 resources are identified with narrative tutorials and screen captures.
Continue reading “Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information”