feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Cambridge, Mass. [u.a.] : Belknap Press of Harvard Univ. Press
    UID:
    b3kat_BV036869145
    Format: 472 S.
    ISBN: 9780674055667
    Note: Includes bibliographical references and index , What is law (and why should we care)? -- Crazy little thing called "law" -- Austin's sanction theory -- Hart and the rule of recognition -- How to do things with plans -- The making of a legal system -- What law is -- Legal reasoning and judicial decision making -- Hard cases -- Theoretical disagreements -- Dworkin and distrust -- The economy of trust -- The interpretation of plans -- The value of legality
    Language: English
    Subjects: Law , Philosophy
    RVK:
    RVK:
    RVK:
    Keywords: USA ; Rechtsphilosophie ; Rechtspositivismus ; Naturrecht ; Legalität ; Rechtsphilosophie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV045510536
    Format: xiii, 437 Seiten
    ISBN: 9780190640408
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Law , Philosophy
    RVK:
    RVK:
    Keywords: Normativität ; Normativismus ; Rechtsphilosophie ; Metaethik ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Cambridge, Massachusetts : 〈〈The〉〉 Belknap Press of Harvard University Press
    UID:
    b3kat_BV047118717
    Format: 472 Seiten
    Edition: First Harvard University Press paperback edition
    ISBN: 9780674725782
    Note: What is law (and why should we care)? -- Crazy little thing called "law" -- Austin's sanction theory -- Hart and the rule of recognition -- How to do things with plans -- The making of a legal system -- What law is -- Legal reasoning and judicial decision making -- Hard cases -- Theoretical disagreements -- Dworkin and distrust -- The economy of trust -- The interpretation of plans -- The value of legality
    Additional Edition: Äquivalent
    Language: English
    Subjects: Law , Philosophy
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: USA ; Rechtsphilosophie ; Rechtspositivismus ; Naturrecht ; Legalität ; Rechtsphilosophie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV044515877
    Format: xxii, 581 Seiten, 24 ungezählte Seiten Tafeln , Illustrationen, Karten
    ISBN: 9780241200704
    Additional Edition: Erscheint auch als ISBN 978-0-241-23904-9
    Language: English
    Subjects: History , Political Science , Law
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Briand-Kellogg-Pakt ; Friedenspolitik ; Geschichte 1927-2015
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV044534330
    Format: xxii, 581 Seiten , Illustrationen, Diagramme , 24 cm
    Edition: First Simon & Schuster hardcover edition
    ISBN: 9781501109867
    Additional Edition: Erscheint auch als Online-Ausgabe, Ebook ISBN 978-1-5011-0988-1
    Language: English
    Subjects: Political Science , Law
    RVK:
    RVK:
    RVK:
    Keywords: Briand-Kellogg-Pakt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    kobvindex_ZLB35064992
    ISBN: 9780374601188
    Content: " Unsettling, absolutely riveting, and8212 for better or worse8212 necessary reading. 8212 Brian Christian, author of Algorithms to Live By and The Alignment Problem An entertaining account of the philosophy and technology of hacking8212 and why we all need to understand it. It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing , Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian Dark Avenger, who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G ö del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime. Includes black-and-white images "
    Content: Biographisches: " Scott J. Shapiro is a professor of law and philosophy at Yale Law School and the director of the Yale Center for Law and Philosophy and its CyberSecurity Lab. He is also the author of Legality and the coauthor, with Oona Hathaway, of The Internationalists: How a Radical Plan to Outlaw War Remade the World. " Rezension(2): "〈a href=http://lj.libraryjournal.com/ target=blank〉〈img src=https://images.contentreserve.com/libraryjournal_logo.png alt=Library Journal border=0 /〉〈/a〉: December 1, 2022 In this grand digital age of information, most of us still don't understand how technology works, which makes us vulnerable to cyberattacks. Director of the Yale Center for Law and Philosophy and its CyberSecurity Lab, Shapiro is here to explain why the internet is so vulnerable,how information is stored, used, and protected,and what we can do to protect ourselves. And that entails introducing us to some of the notorious hackers of the last decades. Copyright 2022 Library Journal, LLC Used with permission. " Rezension(3): "〈a href=http://www.publishersweekly.com target=blank〉〈img src=https://images.contentreserve.com/pw_logo.png alt=Publisher's Weekly border=0 /〉〈/a〉: February 20, 2023 Ingenious coding, buggy software, and gullibility take the spotlight in this colorful retrospective of hacking. Shapiro ( Legality ), director of the cybersecurity lab at Yale’s Center for Law and Philosophy, revisits spectacular computer intrusions and the characters responsible for them, including a Cornell grad student’s 1988 experiment gone awry that crashed the fledgling internet,the battle of wits between Bulgarian hacker Dark Avenger and the computer scientist who worked to defeat his destructive viruses,a Boston 16-year-old’s hacking of nude photos from Paris Hilton’s cellphone,and the exposure of Democratic National Committee emails during the 2016 U.S. presidential election by the Russian military’s Fancy Bear hacking team. He emphasizes the human forces behind the technology, describing the callow malevolence of hackers, the cognitive blind spots that phishing attacks manipulate to get people to click on bogus email links, and the reluctance of profit-hungry corporate executives to pay for cybersecurity. Shapiro’s snappy prose manages the extraordinary feat of describing hackers’ intricate coding tactics and the flaws they exploit in a way that is accessible and captivating even to readers who don’t know Python from JavaScript. The result is a fascinating look at the anarchic side of cyberspace." Rezension(4): "〈a href=http://www.kirkusreviews.com target=blank〉〈img src=https://images.contentreserve.com/kirkus_logo.png alt=Kirkus border=0 /〉〈/a〉: March 15, 2023 A cybersecurity expert delves into the mechanics, psychology, and impact of computer hacking. Shapiro, a professor at Yale Law School and director of Yale's Center for Law and Philosophy and its CyberSecurity Lab, is well situated to explore the downside of the internet. In his latest book, the author looks at some famous cases and players in the shadowy archives of hacking--e.g., when a graduate student accidentally crashed the internet in the 1980s,the invention of the first mutating computer-virus engine by a Bulgarian with the handle Dark Avenger,and Fancy Bear, a group probably affiliated with Russian military intelligence, which broke into the Democratic National Committee system in 2016. Each of these illustrated a technical aspect of hacking, but taken together, they show the breadth of motivations. While some hacks are for money and espionage, most Americans hackers are young men who arrived at it through online game forums and started to do it for the technical challenge and to earn the respect of their peers. This profiling raises the possibility of early identification and recruitment into the cybersecurity side. However, Shapiro believes that hackers will always be a step ahead and that a constant patch-and-pray strategy will eventually lose. Instead, writes the author, cybersecurity measures must be built into computer systems from an early stage. As a possible template, he points to recent legislation in California that requires devices connected to the internet sold or offered for sale in [the state] to have 'reasonable security features.' Another avenue is to require corporations to report about their policies to manage cybersecurity risks. These are good ideas, but one suspects that the devil will be in the implementation details. Overall, this is an engrossing read, although there are parts that are dauntingly technical. Shapiro gives readers plenty to think about the next time they turn on their computers. An authoritative, disturbing examination of hacking, cybercrime, and techno-espionage. COPYRIGHT(2023) Kirkus Reviews, ALL RIGHTS RESERVED. " Rezension(5): "〈a href=https://www.booklistonline.com target=blank〉〈img src=https://images.contentreserve.com/booklist_logo.png alt=Booklist border=0 /〉〈/a〉: April 15, 2023 Shapiro, philosophy professor at Yale Law School, set out to answer three questions: decades after the internet's invention, why does it remain so insecure? How do hackers access data from anywhere? What could be done in response to these vulnerabilities? Using five significant hacks, he outlines the history of the internet and the parallel evolution of hacking and cybercrime. Shapiro describes the Morris Worm, a self-replicating program that infected computers across the U.S. within hours of its release by a Cornell graduate student in 1988. He explains how weak security in T-Mobile's phones allowed a 16-year-old to steal Paris Hilton's cell phone data. Another example centers on how the Russian military intelligence unit Fancy Bear used phishing schemes to hack the DNC and Clinton campaign emails during the 2016 election. Shapiro explores cyberwar, the psychology of hackers, and the impact of tech giants such as Microsoft and AOL. Written for readers without deep technical backgrounds, this is an engaging and thought-provoking examination of the human elements of technology. COPYRIGHT(2023) Booklist, ALL RIGHTS RESERVED. "
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_167067973X
    Format: 1 online resource.
    ISBN: 9780190640439
    Series Statement: Oxford scholarship online
    Content: This text collects together new essays by moral and legal philosophers that are aimed at knocking down a disciplinary wall that divides contemporary philosophical thinking about the nature of morality and contemporary philosophical thinking about the nature of law.
    Note: Previously issued in print: 2019. - Includes bibliographical references and index. - Description based on online resource; title from home page (viewed on January 10, 2019)
    Additional Edition: ISBN 9780190640408
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780190640408
    Additional Edition: Erscheint auch als Druck-Ausgabe Dimensions of normativity New York, NY : Oxford University Press, 2019 ISBN 9780190640408
    Language: English
    Subjects: Law
    RVK:
    RVK:
    RVK:
    Keywords: Rechtsphilosophie ; Metaethik ; Normativität ; Normativismus ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV049012565
    Format: 420 Seiten , Illustrationen , 24 cm
    ISBN: 9780241461969
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Internetkriminalität ; Geschichte ; Computerkriminalität ; Hacker ; Cyberattacke ; Phishing ; Internet ; Computersicherheit ; Informationsgesellschaft
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    kobvindex_ZLB35167172
    Edition: Unabridged
    ISBN: 9781250903488
    Content: " Unsettling, absolutely riveting, and8212 for better or worse8212 necessary reading. 8212 Brian Christian, author of Algorithms to Live By and The Alignment Problem An entertaining account of the philosophy and technology of hacking8212 and why we all need to understand it. It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing , Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian Dark Avenger, who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G ö del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime. A Macmillan Audio production from Farrar, Straus and Giroux. "
    Content: Biographisches: " Scott J. Shapiro is a professor of law and philosophy at Yale Law School and the director of the Yale Center for Law and Philosophy and its CyberSecurity Lab. He is also the author of Legality and the coauthor, with Oona Hathaway, of The Internationalists: How a Radical Plan to Outlaw War Remade the World. "
    Language: English
    Keywords: Hörbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    kobvindex_ZLB35099682
    Format: 420 Seiten , Illustrationen , 24 cm
    ISBN: 9780241461969
    Content: "A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
    Language: English
    Keywords: Internetkriminalität ; Cyberattacke ; Phishing ; Computerkriminalität ; Hacker ; Informationsgesellschaft ; Computersicherheit ; Internet
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages