The tech contracts handbook : cloud computing agreements, software licenses, and other IT contracts for lawyers and businesspeople / / David W. Tollen
| The tech contracts handbook : cloud computing agreements, software licenses, and other IT contracts for lawyers and businesspeople / / David W. Tollen |
| Autore | Tollen David W |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Chicago, Illinois : , : American Bar Association, Section of Intellectual Property Law, , [2015] |
| Descrizione fisica | 1 online resource (216 pages) : forms |
| Disciplina | 346.7302 |
| Soggetto topico |
Internet
new technology software data-processing law information technology trade licence liability Computer contracts - United States Technology transfer - Law and legislation - United States Computer software - Licenses - United States Copyright - Computer programs - United States |
| ISBN | 1-63425-179-2 |
| Classificazione | 32.20.32 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Prime clauses -- General clauses -- Boilerplate clauses. |
| Record Nr. | UNINA-9910672395303321 |
Tollen David W
|
||
| Chicago, Illinois : , : American Bar Association, Section of Intellectual Property Law, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ten Laws for Security / / by Eric Diehl
| Ten Laws for Security / / by Eric Diehl |
| Autore | Diehl Eric |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (xix, 281) : ill |
| Disciplina | 005.82 |
| Soggetto topico |
Data encryption (Computer science)
Computer security System safety Cryptology Systems and Data Security Security Science and Technology |
| ISBN |
3-319-42641-9
9783319426419 |
| Classificazione |
32.20.32
32.24.48 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography. |
| Record Nr. | UNINA-9910151661403321 |
Diehl Eric
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||