Hardback
Technology and Security for Lawyers and Other Professionals
The Basics and Beyond
9781803923901 Edward Elgar Publishing
Technology proficiency is now a necessity for most professionals. In this very practical book, W. Kuan Hon presents a comprehensive foundational guide to technology and cybersecurity for lawyers and other non-technologists seeking a solid grounding in key tech topics. Adopting a multidisciplinary approach, elucidating the high-level basics then going a step beyond, Hon clearly explains core technical computing subjects: hardware/software, computing models/APIs, data storage/databases, programming, networking including Internet/web, email and mobile, and AI/machine learning including LLMs, detailing cybersecurity essentials and flagging various security/privacy-related issues throughout.
More Information
Critical Acclaim
Contents
More Information
Technology proficiency is now a necessity for most professionals. In this very practical book, W. Kuan Hon presents a comprehensive foundational guide to technology and cybersecurity for lawyers and other non-technologists seeking a solid grounding in key tech topics. Adopting a multidisciplinary approach that elucidates the high-level basics then goes a step beyond, Hon clearly explains core technical computing subjects: hardware/software, computing models/APIs, data storage/databases, programming, networking including Internet/web, email and mobile, and artificial intelligence/machine learning including LLMs, detailing cybersecurity essentials like encryption/hashing, public key infrastructure, digital signatures and PETs and flagging various security/privacy-related aspects throughout. Concrete examples help to consolidate understanding and illustrate the practical issues.
Key Features:
● Direct, engaging writing style
● Concise, accessible explanations of key computing-related concepts
● Highlights fines/legal action regarding specific security/tech-related issues
● Companion PDF contains several ‘try-it-yourself’ illustrations and further information
● Provides an excellent framework for interpreting and applying laws/regulations on technology/communications, privacy/data protection, security and/or AI/ML
This book is an indispensable learning and reference work for professionals practising in technology/communications, privacy/security and/or data laws and compliance, offering an in-depth grounding in technology fundamentals and key practical issues. Analysts/consultants, compliance managers, policymakers/lawmakers and regulators/judges will also benefit from this book.
Key Features:
● Direct, engaging writing style
● Concise, accessible explanations of key computing-related concepts
● Highlights fines/legal action regarding specific security/tech-related issues
● Companion PDF contains several ‘try-it-yourself’ illustrations and further information
● Provides an excellent framework for interpreting and applying laws/regulations on technology/communications, privacy/data protection, security and/or AI/ML
This book is an indispensable learning and reference work for professionals practising in technology/communications, privacy/security and/or data laws and compliance, offering an in-depth grounding in technology fundamentals and key practical issues. Analysts/consultants, compliance managers, policymakers/lawmakers and regulators/judges will also benefit from this book.
Critical Acclaim
‘Kuan’s encyclopedic knowledge of all things legal and technological never failed to impress me. I would challenge anyone to find a lawyer as conversant in technology and data privacy as Kuan. . . . If technology leaves you baffled, then don’t worry – that’s what this book is for. And if, like me, you have a greater understanding of technology, I can promise you this book will prove an invaluable reference.’
– Phil Lee, Managing Director, Digiphile, UK
‘Once in a while, I come across a book I choose to keep as a reference. Such is the case with Dr. Hon’s book. Her aim to provide non-IT experts a grounding in IT/ICT concepts is overwhelmingly met with an exceptional breadth and depth of information that guides us through the complex world of information technology.’
– Chantal Bernier, Co-Lead, Dentons Global Privacy and Cybersecurity Group, Co-directrice, Groupe mondial sur la vie privée et la cybersécurité and former Commissioner at the Office of the Privacy Commissioner of Canada
‘Dr Kuan Hon has achieved a unique goal: she has managed to explain complicated technical notions in simple language, accessible to legal scholars at all levels, from lawyers to judges and law students. A must-read for everyone interested in law and technology!’
– Eleni Kosta, Professor of Technology Law and Human Rights, Tilburg University, the Netherlands
‘Dr W. Kuan Hon has a knack for distilling technical knowledge into simple and concise information. She has done it again in this comprehensive and accessible book on fundamental IT/ICT concepts, which even includes chapters on artificial intelligence and machine learning. This book is a valuable resource for lawyers and laypersons, as well as IT experts learning how to explain technical concepts in easily understandable language.’
– Darren Grayson Chng, Regional Data Protection Director, APAC & MEA, Electrolux and Asia Advisory Board Member, International Association of Privacy Professionals
– Phil Lee, Managing Director, Digiphile, UK
‘Once in a while, I come across a book I choose to keep as a reference. Such is the case with Dr. Hon’s book. Her aim to provide non-IT experts a grounding in IT/ICT concepts is overwhelmingly met with an exceptional breadth and depth of information that guides us through the complex world of information technology.’
– Chantal Bernier, Co-Lead, Dentons Global Privacy and Cybersecurity Group, Co-directrice, Groupe mondial sur la vie privée et la cybersécurité and former Commissioner at the Office of the Privacy Commissioner of Canada
‘Dr Kuan Hon has achieved a unique goal: she has managed to explain complicated technical notions in simple language, accessible to legal scholars at all levels, from lawyers to judges and law students. A must-read for everyone interested in law and technology!’
– Eleni Kosta, Professor of Technology Law and Human Rights, Tilburg University, the Netherlands
‘Dr W. Kuan Hon has a knack for distilling technical knowledge into simple and concise information. She has done it again in this comprehensive and accessible book on fundamental IT/ICT concepts, which even includes chapters on artificial intelligence and machine learning. This book is a valuable resource for lawyers and laypersons, as well as IT experts learning how to explain technical concepts in easily understandable language.’
– Darren Grayson Chng, Regional Data Protection Director, APAC & MEA, Electrolux and Asia Advisory Board Member, International Association of Privacy Professionals
Contents
Contents:
Foreword xiii
Preface xvi
PART I COMPUTING, HARDWARE/SOFTWARE,
DATA AND PROGRAMMING
1 Computing terminology, computing models and bits
2 Hardware
3 Running programs; software
4 APIs, virtualization, serverless, hardware/software
identification
5 Data storage
6 Programming/coding, software development
PART II SECURITY
7 Security risks and concepts
8 Attack vectors
9 Cryptography; PETs
10 Public key infrastructure; passwords
11 Attack and defence
PART III COMMUNICATIONS
12 Networking and IP addresses
13 Networking/Internet infrastructure and technologies
14 Web, URLs, domains, DNS
15 Webpages, HTTP, cookies and related issues
16 Web security, deep/dark web, Internet control
17 Email
18 Mobile wireless/cellular communications networks
PART IV ARTIFICIAL INTELLIGENCE AND
MACHINE LEARNING
19 AI/machine learning terminology and paradigms
20 Data science and PETs
21 Machine learning projects
22 Artificial neural networks
23 Artificial intelligence: challenges and risks
Afterword: confluence, convergence, emergence
Foreword xiii
Preface xvi
PART I COMPUTING, HARDWARE/SOFTWARE,
DATA AND PROGRAMMING
1 Computing terminology, computing models and bits
2 Hardware
3 Running programs; software
4 APIs, virtualization, serverless, hardware/software
identification
5 Data storage
6 Programming/coding, software development
PART II SECURITY
7 Security risks and concepts
8 Attack vectors
9 Cryptography; PETs
10 Public key infrastructure; passwords
11 Attack and defence
PART III COMMUNICATIONS
12 Networking and IP addresses
13 Networking/Internet infrastructure and technologies
14 Web, URLs, domains, DNS
15 Webpages, HTTP, cookies and related issues
16 Web security, deep/dark web, Internet control
17 Email
18 Mobile wireless/cellular communications networks
PART IV ARTIFICIAL INTELLIGENCE AND
MACHINE LEARNING
19 AI/machine learning terminology and paradigms
20 Data science and PETs
21 Machine learning projects
22 Artificial neural networks
23 Artificial intelligence: challenges and risks
Afterword: confluence, convergence, emergence