Technology proficiency is now a necessity for most professionals. In this very practical book, W. Kuan Hon presents a comprehensive foundational guide to technology and cybersecurity for lawyers and other non-technologists seeking a solid grounding in key tech topics. Adopting a multidisciplinary approach that elucidates the high-level basics then goes a step beyond, Hon clearly explains core technical computing subjects: hardware/software, computing models/APIs, data storage/databases, programming, networking including Internet/web, email and mobile, and artificial intelligence/machine learning including LLMs, detailing cybersecurity essentials like encryption/hashing, public key infrastructure, digital signatures and PETs and flagging various security/privacy-related aspects throughout. Concrete examples help to consolidate understanding and illustrate the practical issues.Key Features:Direct, engaging writing styleConcise, accessible explanations of key computing-related conceptsHighlights fines/legal action regarding specific security/tech-related issuesCompanion PDF contains several ‘try-it-yourself’ illustrations and further informationProvides an excellent framework for interpreting and applying laws/regulations on technology/communications, privacy/data protection, security and/or AI/MLThis book is an indispensable learning and reference work for professionals practising in technology/communications, privacy/security and/or data laws and compliance, offering an in-depth grounding in technology fundamentals and key practical issues. Analysts/consultants, compliance managers, policymakers/lawmakers and regulators/judges will also benefit from this book.
W. Kuan Hon, Of Counsel, Dentons, UK and an Editor, Encyclopedia of Data Protection and Privacy
Contents:Foreword xiiiPreface xviPART I COMPUTING, HARDWARE/SOFTWARE,DATA AND PROGRAMMING1 Computing terminology, computing models and bits 2 Hardware 3 Running programs; software 4 APIs, virtualization, serverless, hardware/softwareidentification 5 Data storage 6 Programming/coding, software development PART II SECURITY7 Security risks and concepts 8 Attack vectors 9 Cryptography; PETs 10 Public key infrastructure; passwords 11 Attack and defence PART III COMMUNICATIONS12 Networking and IP addresses 13 Networking/Internet infrastructure and technologies 14 Web, URLs, domains, DNS 15 Webpages, HTTP, cookies and related issues 16 Web security, deep/dark web, Internet control 17 Email 18 Mobile wireless/cellular communications networks PART IV ARTIFICIAL INTELLIGENCE ANDMACHINE LEARNING19 AI/machine learning terminology and paradigms 20 Data science and PETs 21 Machine learning projects 22 Artificial neural networks 23 Artificial intelligence: challenges and risks Afterword: confluence, convergence, emergence
‘Those who work in law and technology are sure to encounter some aspect of hardware or software that they do not understand, either because it is new or because they simply have not needed to know about it before. In these situations, this book will be a very useful reference.’