Best Science & Technology Law Books
Here you will get Best Science & Technology Law Books For you.This is an up-to-date list of recommended books.
1. Token Economy: How the Web3 reinvents the Internet
Author: by Shermin Voshmgir
This is the second edition of the book Token Economy originally published in June 2019. The basic structure of this second edition is the same as the first edition, with slightly updated content of existing chapters and four additional chapters: “User-Centric Identities,” “Privacy Tokens,” “Lending Tokens,” and How to Design a Token System and more focus on the Web3.
//Part one outlines the fundamental building blocks of the Web3, including the role of cryptography and user-centric digital identities. Part two explains Web3 applications like smart contracts, DAOs & tokens. The last two parts of the book focus on tokens as the atomic unit of the Web3, explaining the properties and functions of money and outlining the emerging field of decentralized finance (DeFi) that might power a potential future digital barter economy.
Use cases such as asset tokens, purpose driven tokens, BAT (Basic Attention Token), social media tokens (Steemit, Hive and Reddit), privacy tokens, and stable tokens are explored, including the role of CBDCs (Central Bank Digital Currencies) and Facebook’s Libra. //Tokens – often referred to as cryptocurrencies – can represent anything from an asset to an access right, such as gold, diamonds, a fraction of a Picasso painting or an entry ticket to a concert.
2. How to Measure Anything in Cybersecurity Risk
Author: by Douglas W. Hubbard
A ground shaking expos on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current “risk management” practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.
In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world’s eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm.
Some of the field’s premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation.
You’ll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.
3. Power to the Public: The Promise of Public Interest Technology
Author: by Tara Dawson McGuinness
Worth a read for anyone who cares about making change happen. Barack ObamaA powerful new blueprint for how governments and nonprofits can harness the power of digital technology to help solve the most serious problems of the twenty-first centuryAs the speed and complexity of the world increases, governments and nonprofit organizations need new ways to effectively tackle the critical challenges of our timefrom pandemics and global warming to social media warfare.
In Power to the Public, Tara Dawson McGuinness and Hana Schank describe a revolutionary new approachpublic interest technologythat has the potential to transform the way governments and nonprofits around the world solve problems. Through inspiring stories about successful projects ranging from a texting service for teenagers in crisis to a streamlined foster care system, the authors show how public interest technology can make the delivery of services to the public more effective and efficient.
At its heart, public interest technology means putting users at the center of the policymaking process, using data and metrics in a smart way, and running small experiments and pilot programs before scaling up. And while this approach may well involve the innovative use of digital technology, technology alone is no panaceaand some of the best solutions may even be decidedly low-tech.
The Mastermind: A True Story of Murder, Empire, and a New Kind of Crime Lord
Author: by Evan Ratliff
The incredible true story of the decade-long quest to bring down Paul Le Rouxthe creator of a frighteningly powerful Internet-enabled cartel who merged the ruthlessness of a drug lord with the technological savvy of a Silicon Valley entrepreneur. A tour de force of shoe-leather reportingundertaken, amid threats and menacing, at considerable personal risk.
Los Angeles TimesNAMED ONE OF THE BEST BOOKS OF THE YEAR BY The New York Times Book Review NPR Evening Standard Kirkus ReviewsIt all started as an online prescription drug network, supplying hundreds of millions of dollars’ worth of painkillers to American customers.
It would not stop there. Before long, the business had turned into a sprawling multinational conglomerate engaged in almost every conceivable aspect of criminal mayhem. Yachts carrying $100 million in cocaine. Safe houses in Hong Kong filled with gold bars. Shipments of methamphetamine from North Korea.
Weapons deals with Iran. Mercenary armies in Somalia. Teams of hit men in the Philippines. Encryption programs so advanced that the government could not break them. The man behind it all, pulling the strings from a laptop in Manila, was Paul Calder Le Rouxa reclusive programmer turned criminal genius who could only exist in the networked world of the twenty-first century, and the kind of self-made crime boss that American law enforcement had never imagined.
5. Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
Author: by Timo Steffens
An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing.
Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.
Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.
6. Predict and Surveil: Data, Discretion, and the Future of Policing
Author: by Sarah Brayne
Oxford University Press
The scope of criminal justice surveillance has expanded rapidly in recent decades. At the same time, the use of big data has spread across a range of fields, including finance, politics, healthcare, and marketing. While law enforcement’s use of big data is hotly contested, very little is knownabout how the police actually use it in daily operations and with what consequences.
In Predict and Surveil, Sarah Brayne offers an unprecedented, inside look at how police use big data and new surveillance technologies, leveraging on-the-ground fieldwork with one of the most technologically advanced law enforcement agencies in the world-the Los Angeles Police Department.
Drawing onoriginal interviews and ethnographic observations, Brayne examines the causes and consequences of algorithmic control. She reveals how the police use predictive analytics to deploy resources, identify suspects, and conduct investigations; how the adoption of big data analytics transforms policeorganizational practices; and how the police themselves respond to these new data-intensive practices.
7. Tomorrow's Lawyers: An Introduction to Your Future
Author: by Richard Susskind
Oxford University Press
Tomorrow’s Lawyers predicts that we are at the beginning of a period of fundamental transformation in law: a time in which we will see greater change than we have seen in the past two centuries. Where the future of the legal service will be a world of internet-based global businesses, onlinedocument production, commoditized service, legal process outsourcing, and web based simulation practice.
Legal markets will be liberalized, with new jobs for lawyers and new employers too. This book is a definitive guide to this future – for young and aspiring lawyers, and for all who want tomodernize our legal and justice systems.
It introduces the new legal landscape and offers practical guidance for those who intend to build careers and businesses in law. Tomorrow’s Lawyers is divided into three parts. The first is an updated restatement of Richard Susskind’s views on the future of legal services, as laid out in his previous bestselling works, The Future of Law , Transforming the Law, and The End of Lawyers?.
8. The Dinosaur Artist
Author: by Paige Williams
In this 2018 New York Times Notable Book,Paige Williams “does for fossils what Susan Orlean did for orchids” (Book Riot) in her account of one Florida man’s attempt to sell a dinosaur skeleton from Mongolia-a story “steeped in natural history, human nature, commerce, crime, science, and politics” (Rebecca Skloot).
In 2012, a New York auction catalogue boasted an unusual offering: “a superb Tyrannosaurus skeleton.” In fact, Lot 49135 consisted of a nearly complete T. Bataar, a close cousin to the most famous animal that ever lived. The fossils now on display in a Manhattan event space had been unearthed in Mongolia, more than 6,000 miles away.
At eight-feet high and 24 feet long, the specimen was spectacular, and when the gavel sounded the winning bid was over $1 million. Eric Prokopi, a thirty-eight-year-old Floridian, was the man who had brought this extraordinary skeleton to market. A onetime swimmer who spent his teenage years diving for shark teeth, Prokopi’s singular obsession with fossils fueled a thriving business hunting, preparing, and selling specimens, to clients ranging from natural history museums to avid private collectors like actor Leonardo DiCaprio.
9. Code: And Other Laws of Cyberspace, Version 2.0
Author: by Lawrence Lessig
There’s a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government’s (or anyone else’s) control. Code, first published in 2000, argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no “nature.” It only has code-the software and hardware that make cyberspace what it is.
That code can create a place of freedom-as the original architecture of the Net did-or a place of oppressive control. Under the influence of commerce, cyberspace is becoming a highly regulable space, where behavior is much more tightly controlled than in real space.
But that’s not inevitable either. We can-we must-choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies.
10. Future Crimes: Inside the Digital Underground and the Battle for Our Connected World
Author: by Marc Goodman
From former FBI Futurist, Interpol advisor and beat cop Marc Goodman, a deep dive into the digital underground illuminating the alarming ways criminals, corporations, and even countries are using new and emerging technologies against youand how this makes everyone more vulnerable than you ever thought possible.
NEW YORK TIMES and WALL STREET JOURNAL BESTSELLERTechnological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinningfrom implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences.
With explosive insights based on a career in law enforcement and counterterrorism, leading authority on global security Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. He explores how bad actors are primed to hijack the technologies of tomorrow.
11. The Twenty-Six Words That Created the Internet
Author: by Jeff Kosseff
Cornell University Press
As seen on CBS 60 Minutes”No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”Did you know that these twenty-six words are responsible for much of America’s multibillion-dollar online industry?
What we can and cannot write, say, and do online is based on just one lawa law that protects online services from lawsuits based on user content. Jeff Kosseff exposes the workings of Section 230 of the Communications Decency Act, which has lived mostly in the shadows since its enshrinement in 1996.
Because many segments of American society now exist largely online, Kosseff argues that we need to understand and pay attention to what Section 230 really means and how it affects what we like, share, and comment upon every day. The Twenty-Six Words That Created the Internet tells the story of the institutions that flourished as a result of this powerful statute.
It introduces us to those who created the law, those who advocated for it, and those involved in some of the most prominent cases decided under the law. Kosseff assesses the law that has facilitated freedom of online speech, trolling, and much more.
12. Digital Assets and Blockchain Technology: U.S. Law and Regulation
Author: by Daniel T. Stabile
This textbook examines the legal and regulatory approaches to digital assets and related technology taken by United States regulators. As cryptoassets and other blockchain applications mature, and regulatory authorities work hard to keep pace, Daniel Stabile, Kimberly Prior and Andrew Hinkes invite students to consider the legal approaches, challenges and tension points inherent in regulating these new products and systems.
The authors explore the attempts to apply securities laws and money transmission regulation, the growth of smart contracts, the taxation of digital assets, and the intersection of digital assets and criminal law. This innovative and unique textbook features: Commentary and analysis by three leading attorneys engaged with the regulation of digital assets and blockchain technology, offering practical, real-world acumen A comprehensive overview of the origins, key features and mechanisms of blockchain technology, as well as a broad intimation of the divisive debates that will shape the future of digital assets, to guarantee a thorough introduction to the topic for students Excerpts of authorities and other materials from key regulators, including the Financial Crimes Enforcement Network, the Securities and Exchange Commission, the Commodities Futures Trade Commission, and the Internal Revenue Service, to add insight and nuance to classroom discussions.
13. Cyberlaw: The Law of the Internet and Information Technology
Author: by Brian Craig
Featuring the most current exploration of cyberlaw, CYBERLAW helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy.
Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlawfrom cases to legislation to regulations.
14. The EU General Data Protection Regulation (GDPR): A Commentary
Author: by Christopher Kuner
FREE Update to Selected CommentariesThis new book provides an article-by-article commentary on the new EU General Data Protection Regulation. Adopted in April 2016 and applicable from May 2018, the GDPR is the centrepiece of the recent reform of the EU regulatory framework for protection of personal data.
It replaces the 1995 EU Data Protection Directive and has become the most significant piece of data protection legislation anywhere inthe world. The book is edited by three leading authorities and written by a team of expert specialists in the field from around the EU and representing different sectors (including academia, the EU institutions, data protection authorities, and the private sector), thus providing a pan-Europeananalysis of the GDPR.
It examines each article of the GDPR in sequential order and explains how its provisions work, thus allowing the reader to easily and quickly elucidate the meaning of individual articles. An introductory chapter provides an overview of the background to the GDPR and its placein the greater structure of EU law and human rights law.
15. Electronic Payment Systems: Law and Emerging Technologies
Author: by Edward A. Morse
Banking and payment systems are continually becoming more complex. Technological innovations have impacted the structure, form, and variety of payment systems, increasing their variety as well as their ubiquity on an international level. This guide explores these innovations and the legal and technological questions that they present.
Written by experts in the field, this book provides a topical discussion of the principal electronic payment systems utilized today. Beginning with an overview of modern payment systems, this comprehensive guide:Discusses the primary modern payment systems, which form the rails for significant innovationExamines the next generation of payments technologies, which are seeking to deliver greater efficiency, convenience, and utility for businesses and consumers Details important regulatory concerns, including money laundering, tax enforcement, and sanctions regimesIncludes legal and policy insights in the payments environment including the European Union and the U.S.