history

Money: The Unauthorized Biography–From Coinage to Cryptocurrencies

What is money, and how does it work? In this tour de force of political, cultural, and economic history, Felix Martin challenges nothing less than our conventional understanding of one of humankind’s greatest inventions. Martin describes how the Western idea of money emerged in the ancient world, and was shaped over the centuries by tensions between sovereigns and …

Learn more

Understanding Bitcoin: Cryptography, Engineering and Economics (The Wiley Finance Series)

Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably one of the biggest developments in finance since the advent of fiat currency. With Understanding Bitcoin, expert author Pedro Franco provides finance professionals with a complete technical guide and resource to the cryptography, engineering and economic development of Bitcoin and other cryptocurrencies. This comprehensive, yet …

Learn more

Digital Communication: Communication, Multimedia, Security (X.media.publishing)

The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a …

Learn more

Bill Gates: A Biography (Greenwood Biographies)

Bill Gates has been instrumental in creating and developing the home computing era that has thoroughly transformed nearly every aspect of our lives, from work to commerce to communication. Stepping down as CEO of Microsoft in 2000 after 25 years at the helm, he remained as chairman, a position he still holds.This book paints a vivid picture of …

Learn more

Social Media and the Law: A Guidebook for Communication Students and Professionals

Social media platforms like Facebook, Twitter, Pinterest, YouTube, and Flickr allow users to connect with one another and share information with the click of a mouse or a tap on a touchscreen―and have become vital tools for professionals in the news and strategic communication fields. But as rapidly as these services have grown in popularity, their legal ramifications aren’t …

Learn more

The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals

The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals provides practical cyber threat information, guidance, and strategies to lawyers and law firms of all sizes. The guide considers the interrelationship between lawyer and client, establishing what legal responsibilities and professional obligations are owed to the client in the event of a cyber attack. The …

Learn more

Smart Technologies and the End(s) of Law: Novel Entanglements of Law and Technology

‘Do conceptions of the Rule of Law reflect timeless truths, or are they in fact contingent on a particular information and communications infrastructure – one that we are fast leaving behind? Hildebrandt has engineered a provocative encounter between law and networked digital technologies that cuts to the heart of the dilemma confronting legal institutions in a networked world.’- …

Learn more

Litigation Practice: E–Discovery and Technology

LITIGATION PRACTICE: E-DISCOVERY AND TECHNOLOGY is a thorough introduction to the latest techniques of electronic discovery (“e-discovery”) and technology for use in civil cases from inception through trial. It offers extensive hands-on practice with several popular modern tools for office management, case management, discovery, graphic creation, and trial presentation. Each step and each …

Learn more

Cybercrime and the Law: Challenges, Issues, and Outcomes

The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which …

Learn more

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.  The word …

Learn more