Law for Computer Scientists and Other Folk
This is the first textbook introducing law to computer scientists.
Law for Computer Scientists and Other Folk Read MoreThis is the first textbook introducing law to computer scientists.
Law for Computer Scientists and Other Folk Read MoreMost legal scholars agree the list of professions includes medicine and law. Beyond that there is little consensus as to who else qualifies.
Software Professionals, Malpractice Law, and Codes of Ethics Read MoreWe Have Root: Even More Advice from Schneier on Security By Bruce Schneier Published by John Wiley & Sons, Inc., September 2019. ISBN: 978-1-119-64301-2 “A collection of popular essays from security guru Bruce Schneier ” In his latest collection of …
We Have Root: Even More Advice from Schneier on Security Read MoreThe Lawfare Podcast is the weekly audio production of the Lawfare staff in cooperation with the Brookings Institution. Podcast episodes include interviews with policymakers, scholars, journalists, and analysts; events and panel discussions.
Lawfare Podcast Read MoreAs our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals’ stealing credit card and social security number information to foreign governments’ hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.
Lawfare Blog – Cybersecurity Read MoreDayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
DayZero: Cybersecurity Law and Policy Read More