Technology proficiency is now a necessity for most professionals. In this very practical book, W. Kuan Hon presents a comprehensive foundational guide to technology and cybersecurity for lawyers and other non-technologists seeking a solid grounding in key tech topics. Adopting a multidisciplinary approach that elucidates the high-level basics then goes a step beyond, Hon clearly explains core technical computing subjects: hardware/software, computing models/APIs, data storage/databases, programming, networking including Internet/web, email and mobile, and artificial intelligence/machine learning including LLMs, detailing cybersecurity essentials like encryption/hashing, public key infrastructure, digital signatures and PETs and flagging various security/privacy-related aspects throughout. Concrete examples help to consolidate understanding and illustrate the practical issues.
Key Features:
Direct, engaging writing style
Concise, accessible explanations of key computing-related concepts
Highlights fines/legal action regarding specific security/tech-related issues
Companion PDF contains several ‘try-it-yourself’ illustrations and further information
Provides an excellent framework for interpreting and applying laws/regulations on technology/communications, privacy/data protection, security and/or AI/ML
This book is an indispensable learning and reference work for professionals practising in technology/communications, privacy/security and/or data laws and compliance, offering an in-depth grounding in technology fundamentals and key practical issues. Analysts/consultants, compliance managers, policymakers/lawmakers and regulators/judges will also benefit from this book.
Contents:
Foreword xiii
Preface xvi
PART I COMPUTING, HARDWARE/SOFTWARE,
DATA AND PROGRAMMING
1 Computing terminology, computing models and bits
2 Hardware
3 Running programs; software
4 APIs, virtualization, serverless, hardware/software
identification
5 Data storage
6 Programming/coding, software development
PART II SECURITY
7 Security risks and concepts
8 Attack vectors
9 Cryptography; PETs
10 Public key infrastructure; passwords
11 Attack and defence
PART III COMMUNICATIONS
12 Networking and IP addresses
13 Networking/Internet infrastructure and technologies
14 Web, URLs, domains, DNS
15 Webpages, HTTP, cookies and related issues
16 Web security, deep/dark web, Internet control
17 Email
18 Mobile wireless/cellular communications networks
PART IV ARTIFICIAL INTELLIGENCE AND
MACHINE LEARNING
19 AI/machine learning terminology and paradigms
20 Data science and PETs
21 Machine learning projects
22 Artificial neural networks
23 Artificial intelligence: challenges and risks
Afterword: confluence, convergence, emergence
Height:
Width:
Spine:
Weight:0.00