Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Books from the Catalog
Punish Seduce or Persuade by Many kinds of interventions have been designed and implemented to combat digital copyright infringement, a type of cyber-deviance that is also known as 'digital piracy'. However, it is not clear whether such measures are indeed effective in reducing this type of deviance. This research sets out out to examine the functioning of these interventions from an empirical perspective. The persistence of digital copyright infringement presents various challenges to governments, the creative industries and other stakeholders that attempt to curtail digital piracy. The author combines both traditional and innovative research methods in order to establish whether and to what extent these interventions are able to curtail digital piracy. This book is of interest to organisations and individuals that are in charge of developing copyright laws and policy or the enforcement thereof. The focus on the evaluation of digital policy also makes the book relevant to evaluators, criminologists and those interested in digital behaviour and digital policy. Revised Dissertation. [Subject: Criminology, Digital Crime]~
Call Number: K1485 L44 2017
Publication Date: 2017-07-27
Security Awareness by Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.
Call Number: TK5105.59.C53 2017
Publication Date: 2016-01-07
Locked Down by In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? This second edition of Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget. Written in clear, non-technical language that any lawyer can understand, this book will help you: Create secure password--and store them safely Assess the existing security risks at your firm: server rooms, cleaning crews, guests, alarm systems, and more Work securely from a laptop or smartphone Protect your mobile devices from theft Authenticate users and encrypt your data Maintain e-mail integrity Secure your wired or wireless network Effectively wipe data from a hard drive before disposal Develop an information security checklist for your firm Investigate, contain, and recover from a security breach"
Call Number: KF320.A9N45 2016
Publication Date: 2016-08-07
Intellectual Privacy by Most people believe that the right to privacy is inherently at odds with the right to free speech. Courts all over the world have struggled with how to reconcile the problems of media gossip with our commitment to free and open public debate for over a century. The rise of the Internet has made this problem more urgent. We live in an age of corporate and government surveillance of our lives. And our free speech culture has created an anything-goes environment on the web, where offensive and hurtful speech about others is rife. How should we think about the problems of privacy and free speech? In Intellectual Privacy, Neil Richards offers a different solution, one that ensures that our ideas and values keep pace with our technologies. Because of the importance of free speech to free and open societies, he argues that when privacy and free speech truly conflict, free speech should almost always win. Only when disclosures of truly horrible information are made (such as sex tapes) should privacy be able to trump our commitment to free expression. But in sharp contrast to conventional wisdom, Richards argues that speech and privacy are only rarely in conflict. America's obsession with celebrity culture has blinded us to more important aspects of how privacy and speech fit together. Celebrity gossip might be a price we pay for a free press, but the privacy of ordinary people need not be. True invasions of privacy like peeping toms or electronic surveillance will rarely merit protection as free speech. And critically, Richards shows how most of the law we enact to protect online privacy pose no serious burden to public debate, and how protecting the privacy of our data is not censorship. More fundamentally, Richards shows how privacy and free speech are often essential to each other. He explains the importance of 'intellectual privacy,' protection from surveillance or interference when we are engaged in the processes of generating ideas - thinking, reading, and speaking with confidantes before our ideas are ready for public consumption. In our digital age, in which we increasingly communicate, read, and think with the help of technologies that track us, increased protection for intellectual privacy has become an imperative. What we must do, then, is to worry less about barring tabloid gossip, and worry much more about corporate and government surveillance into the minds, conversations, reading habits, and political beliefs of ordinary people. A timely and provocative book on a subject that affects us all, Intellectual Privacy will radically reshape the debate about privacy and free speech in our digital age.
Call Number: K3263.R53 2015
Publication Date: 2015-02-02
They Know Everything about You by They Know Everything About You is a groundbreaking exposé of how government agencies and tech corporations monitor virtually every aspect of our lives, and a fierce defense of privacy and democracy. The revelation that the government has access to a vast trove of personal online data demonstrates that we already live in a surveillance society. But the erosion of privacy rights extends far beyond big government. Intelligence agencies such as the NSA and CIA are using Silicon Valley corporate partners as their data spies. Seemingly progressive tech companies are joining forces with snooping government agencies to create a brave new world of wired tyranny. Life in the digital age poses an unprecedented challenge to our constitutional liberties, which guarantee a wall of privacy between the individual and the government. The basic assumption of democracy requires the ability of the individual to experiment with ideas and associations within a protected zone, as secured by the Constitution. The unobserved moment embodies the most basic of human rights, yet it is being squandered in the name of national security and consumer convenience. Robert Scheer argues that the information revolution, while a source of public enlightenment, contains the seeds of freedom’s destruction in the form of a surveillance state that exceeds the wildest dream of the most ingenious dictator. The technology of surveillance, unless vigorously resisted, represents an existential threat to the liberation of the human spirit.
Call Number: JC596.2.U5S24 2015
Publication Date: 2015-02-24
Cybersecurity and Cyberwar by A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood. In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon. What Everyone Needs to Know® is a registered trademark of Oxford University Press.
Call Number: QA76.9.A25S562 2014
Publication Date: 2014-01-03
Privacy in the Age of Big Data by Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we re lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are watched, and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us."
Call Number: KF1262.P39 2014
Publication Date: 2014-01-16
The New Digital Age by In an unparalleled collaboration, two leading global thinkers in technology and foreign affairs give us their widely anticipated, transformational vision of the future: a world where everyone is connected--a world full of challenges and benefits that are ours to meet and to harness. Eric Schmidt is one of Silicon Valley's great leaders, having taken Google from a small startup to one of the world's most influential companies. Jared Cohen is the director of Google Ideas and a former adviser to secretaries of state Condoleezza Rice and Hillary Clinton. With their combined knowledge and experiences, the authors are uniquely positioned to take on some of the toughest questions about our future: Who will be more powerful in the future, the citizen or the state? Will technology make terrorism easier or harder to carry out? What is the relationship between privacy and security, and how much will we have to give up to be part of the new digital age? In this groundbreaking book, Schmidt and Cohen combine observation and insight to outline the promise and peril awaiting us in the coming decades. At once pragmatic and inspirational, this is a forward-thinking account of where our world is headed and what this means for people, states and businesses. With the confidence and clarity of visionaries, Schmidt and Cohen illustrate just how much we have to look forward to--and beware of--as the greatest information and technology revolution in human history continues to evolve. On individual, community and state levels, across every geographical and socioeconomic spectrum, they reveal the dramatic developments--good and bad--that will transform both our everyday lives and our understanding of self and society, as technology advances and our virtual identities become more and more fundamentally real. As Schmidt and Cohen's nuanced vision of the near future unfolds, an urban professional takes his driverless car to work, attends meetings via hologram and dispenses housekeeping robots by voice; a Congolese fisherwoman uses her smart phone to monitor market demand and coordinate sales (saving on costly refrigeration and preventing overfishing); the potential arises for "virtual statehood" and "Internet asylum" to liberate political dissidents and oppressed minorities, but also for tech-savvy autocracies (and perhaps democracies) to exploit their citizens' mobile devices for ever more ubiquitous surveillance. Along the way, we meet a cadre of international figures--including Julian Assange--who explain their own visions of our technology-saturated future. Inspiring, provocative and absorbing, The New Digital Age is a brilliant analysis of how our hyper-connected world will soon look, from two of our most prescient and informed public thinkers.
Call Number: HM851.S263 2013
Publication Date: 2013-04-23
Configuring the Networked Self by The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
Call Number: K564.C6C635 2012
Publication Date: 2012-01-24
Internet Law for the Business Lawyer by Learn how the internet has changed the business landscape. This practical book explains the many significant ways the internet and regulations have changed the way business lawyers do business. The book is designed to provide the business lawyer with a toolkit for advising clients in the online environment.
Call Number: KF390.5.C6I569 2012
Publication Date: 2014-01-07
CyberSecurity by A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.
Call Number: QA76.9.A25S493 2016
Publication Date: 2016-02-08
The ABA Cybersecurity Handbook by The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals provides practical cyber threat information, guidance, and strategies to lawyers and law firms of all sizes. The guide considers the interrelationship between lawyer and client, establishing what legal responsibilities and professional obligations are owed to the client in the event of a cyber attack. The book provides strategies to help law firms defend against the cyber threat, and also offers information on how to best to respond if breached.
Call Number: KF318.A7518 2013
Publication Date: 2014-06-10
Call Number: KF390.5.C6R87 2016
Publication Date: 2015-11-20
Call Number: K564.C6R87 2016
Publication Date: 2016-01-12
Call Number: KF390.5.C6R87 2016
Publication Date: 2015-11-20
Cybercrime by This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society. * A chronology traces the emergence and evolution of cybercrime from the 1950s to the present * Detailed descriptions and analysis of real cybercrime cases illustrate what cybercrime is and how cybercriminals operate
Call Number: HV6773 B75 2010
Publication Date: 2010-02-26
- Browser Hijacking
- May replace the existing homepage or search page with an undesired alternative.
- Hostile or intrusive software, installed surreptitiously, that may disrupt computer operation.
- The activity of defrauding internet users by posing as a legitimate enterprise to gain access to secure information.
- Is a malicious software which is designed to block access to a user's or firm's computer data until a ransom is paid.
- Usually irrelevant or unwanted Email messages sent in bulk
- Similar to malware, allows for the surreptitious gathering of information
- A program that when executed may replicate itself and insert itself into other programs, data files and boot sector. The virus may damage the users content and also spread to other computers via a network or by exchanging files.
Norton Internet security company has an excellent Internet Security Glossary.
Other Books - Internet Security
Cybercrime by A current, behind-the-scenes introduction to the rapidly evolving phenomenon of domestic and international cybercrime, including new coverage of cyberterrorism, cyberwarfare, and emerging cyberthreats. * Provides an accessible, comprehensive, and interesting overview of cybercrime and what it means for the average citizen * Explains why domestic law enforcement (state and federal) is essentially ineffective against the cybercrime that primarily comes from abroad * Underscores the serious threat and risk to all U.S. citizens and corporate entities of having their private data, money, and online systems stolen by cybercriminals--thieves that can confidently operate with impunity from being caught or prosecuted * Provides insights from a highly respected expert author and speaker on the subjects of cybercrime, cyberterrorism, and cyberwarfare
Call Number: Forthcoming
Publication Date: 2018-09-30
The Art of Invisibility by Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
Publication Date: 2017-02-14
Internet Security by The Second Edition of Internet Security: How to Defend Against Attackers on the Web (formerly titled Security Strategies in Web Applications and Social Networking) provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications.New and Key Features of the Second Edition: NEW! - New Chapter 4, Securing Mobile Communications Provides a weatlh of exercises and real-world examples Details the latest internet threats and risks when connecting to the internet, as well as mitigating risk and securing applications Discusses penetration testing of production Web sites Examines mobile device and connectivity security
Publication Date: 2015-07-20
Computer Security by
Publication Date: 2014-07-08
Internet Security by
Publication Date: 2014-05-30
Cloud Computing Protected by
Publication Date: 2013-02-01
Essentials of Cyber Security by
Publication Date: 2014-05-14