"Explores evolving cyberlaw pertaining to such issues as data privacy, freedom of expression, intellectual property, e-commerce, and contract law. Free and open source software licensing raises questions regarding developer's liability and trade secrets. Recent advances in surveillance and tapping and in computerized voting technology have also raised many legal issues. The jurisdiction of cyberlaw--should the Internet be treated as a physical space?--is yet another layer. Issues of net neutrality are also considered." --
[17] J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, and L. J. Hwang. Symbolic model checking: 1020 states and beyond. Information and Computation, 98(2), 1992. [18] M. Burmester and Y. Desmedt. A secure and efficient conference ...
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals.
Schechter, S. E., Dhamija, R., Ozment, A., Fischer, I. (2007). „Emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies”. In IEEE Symposium on Security and Privacy.
The book presents an organized test preparation routine through the use of proven series elements and techniques.
Securing Windows 2000 Professional Using the Gold Standard Template: Version 3. 0
Internet an quan fang hu
Все под контролем: кто н как следит за тобой
UNIX與Internet安全防護: 網路篇
下冊,網路篇
Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps