Unravel the Mysteries Before You Speak to Vendors

Total Page:16

File Type:pdf, Size:1020Kb

Unravel the Mysteries Before You Speak to Vendors ACC’s 2008 Annual Meeting Informed. In-house. Indispensable. Tuesday, October 21 11:00 am-12:30 pm 506 Electronic Content Management Systems: Unravel the Mysteries Before You Speak to Vendors David N. Baumann Chief Executive Officer and General Counsel TechNexxus, LLC Jennifer K. Mailander Associate General Counsel Corporation Service Company Penny R. Phillips Corporate Counsel Pinnacle Partners in Medicine Larry L. Sharrar General Counsel Lockheed Martin Space Systems Co. Steve D. Whetstone Vice President Stratify, Inc. An Iron Mountain Digital Company This material is protected by copyright. Copyright © 2008 various authors and the Association of Corporate Counsel (ACC). Materials may not be reproduced without the consent of ACC. Reprint permission requests should be directed to ACC’s Legal Resources Department at ACC: 202/293-4103, ext. 338; [email protected] ACC's 2008 Annual Meeting Informed. In-house. Indispensable. Ms. Mailander currently does pro bono work with Delaware Volunteer Legal Services Faculty Biographies providing legal assistance to low-income clients. David N. Baumann Ms. Mailander received a BA from Miami University and is a graduate of the University of Dayton School of Law. David N. Baumann is general counsel and chief executive officer of TechNexxus, LLC in Potomac, Maryland. He also serves as general counsel and chief executive officer of Penny R. Phillips Infinite Multimedia Networkk, LLC and general counsel of Pathagoras Software, LLC. Mr. Baumann specializes in very large and creative multi-national business process, Penny R. Phillips is corporate counsel for Pinnacle Partners In Medicine, a physician information technology, and telecommunications transactions for a wide range of clients practice group in Dallas, Texas. Her responsibilities include technology law, transactional and technology vendors. He has also developed an array of systems with TechNexxus to matters, corporate governance, billing and compliance, human resources, intellectual support the management of contracts and vendor relationships. property, and other day-to-day operational concerns. Mr. Baumann previously served as vice president and general counsel of Technology Prior to joining Pinnacle, Ms. Phillips was technology lawyer and regional counsel for Partners, Inc., one of the leading information technology outsourcing-consulting firms. PBS&J, a Florida-based engineering company. During her tenure, she developed the Previously, Mr. Baumann was also a partner/member of DLA Piper, Winston & Strawn, company’s electronic records management system, served as legal advisor to the LB3, and Mintz, Levin, resident in the firms’ Washington offices, where he led the company’s Oracle implementation team, and was the project manager for various technology transactions and intellectual property groups. Before private legal practice software implementations, including a risk management information system and the and business and technology consulting, Mr. Baumann was senior attorney/division contract module of Documentum, an enterprise document management system. Ms. counsel for the southeast division of the MCI Communications Corporation. Throughout Phillips was also actively involved in the company’s implementation of Symantec Vault his career, Mr. Baumann has gained substantial experience designing, developing, and for e-mail management. Ms. Phillips was also general counsel for a seminar company in managing successful technology solutions, and profitable companies built on Florida. She also served as an Air Force JAG (a lawyer on active duty) and as an assistant standardized repeatable processes and innovative technologies. He also founded district attorney in West Texas. LexiComm Multimedia Works, LLC one of the first Internet development companies in the mid-Atlantic region, whose operations have been merged into the Infinite Multimedia Ms. Phillips serves on the Pro Bono committee for ACC’ss Dallas-Fort Worth chapter. Network. She is active with the Greyhound Adoption League of Texas, helping develop their database. Mr. Baumann is a widely known and respected speaker on outsourcing strategies and processes. Ms. Phillips received a BA, summa cum laude, from Lubbock Christian University and is a graduate of the Texas Tech University School of Law. Mr. Baumann earned his JD from Case Western Law School and his bachelor’s degree from the University of Rochester. Larry L. Sharrar Jennifer K. Mailander Larry L. Sharrar reports directly to information service & global services (IS & GS) vice president and general counsel in Gaithersburg, Maryland. A member of Lockheed Martin Jennifer K. Mailander is an associate general counsel and product manager for Mission Services (LMMS) president’s executive staff, Mr. Sharrar serves as the LMMS Corporation Service Company (CSC) in Wilmington, Delaware. Her responsibilities general counsel. In this capacity he manages and directs the legal health of $1.8 billion include providing legal counsel to the organization and managing product development per annum scientific and technical company. He personally manages all litigation on with CSC’s Enterprise Risk Management group. Ms. Mailander has extensive experience behalf of LMMS, provides labor and employment advice to the LMMS human resources in corporate and commercial law, compliance, and risk management. staff, provides direct support and assistance to business operations and business development including domestic and foreign joint ventures. He provides legal advice and Prior to joining CSC, Ms. Mailander was a legal consultant with LexisNexis and oversight on international business efforts in both Europe and Asia. corporate counsel for Siemen’s Building Technologies focusing on transactional work. She also worked as a senior regulatory attorney specialist for Fluor Daniel/FERMCO Previously, Mr. Sharrar served in the Air Force, primarily in the Judge Advocate specializing in environmental law. General’s Corp, and retired from the Air Force as a Lieutenant Colonel. After retiring, Mr. Sharrar served as vice president and general counsel of Barba-Arkhon International, 2 of 136 ACC's 2008 Annual Meeting Informed. In-house. Indispensable. Inc., and then he joined Lockheed Martin, where he served in a number of legal positions, before assuming his current position. He regularly participates in ACC sponsored pro-bono activities in the Denver and Colorado Springs area. Mr. Sharrar received a BS from United States Air Force Academy, an MS from the University of Tennessee and is a graduate of the University of Washington School of Law. Introduction Steve D. Whetstone Stephen D. Whetstone, is Stratify’s vice president, client development and strategy. Among other responsibilities, Mr. Whetstone is charged with keeping abreast of legal Penny Phillips developments affecting electronic discovery, working with law firms and general counsel to craft document retention and discovery best practices, and honing Stratify’s strategic position, services and product offerings in the legal market. Prior to joining Stratify, Mr. Whetstone was a litigation partner at Testa Hurwitz & Thibeault, LLP, one of Boston’s largest law firms, where he represented clients in Corporate Counsel securities class actions, government and internal investigations, patent and intellectual property matters, and other complex commercial litigation and at trial. Before joining Testa, Mr. Whetstone was a litigator at Skadden Arps. While practicing, Mr. Whetstone successfully handled many litigations and investigations that turned on analyzing large volumes of electronic data and evidence under tight time constraints. Prior to law school, Mr. Whetstone spent several years working in the political arena and with the media, including as chief of staff for Massachusetts State Senator (now Congressman) John W. Olver. Mr. Whetstone has written many articles and papers on electronic data and discovery issues, which have appeared in the National Law Journal, Legal Times, IP Litigator, Privacy Law Journal, Digital Discovery & E-Evidence, Industry Week, Mealey’s, and E-Discovery other prominent national publications. He is also a frequent speaker at national and international conferences and CLE programs on electronic discovery legal developments and best practices. Stephen Whetstone, Esq. Mr. Whetstone received his BA from Bates College and JD from Northeastern University School of Law. Vice President 3 of 136 ACC's 2008 Annual Meeting Informed. In-house. Indispensable. Historical Legal Data/ E-Discovery Buckets Industry Paradigm Consultants Products The “Big Four” (e.g., PwC) Preservation Global Litigation Management Archives (e.g., Iron Mountain) (e.g., Navigant) Live Monitoring (e.g., Orchestria) Forensic Accountants (e.g., BDO) Holds (e.g., PSS/Atlas) Information Lifecycle Companies Forensic Collections (e.g., Guidance) (e.g., Iron Mountain) Emerging Legal Data/ E-Discovery Buckets Industry Paradigm Automatic Scanning Searching concept organization Turned paper into OCR technology Documents electronic images automatically Keyword search Reduced huge sorted by subject Requires pre- number of boxes understanding of Search metadata Still required matter and content manual review Installable Early look at data universe and Installable systems adapt systems prioritize review ASP systems SaaS systems 1980s 1990s 2000s 4 of 136 ACC's 2008 Annual Meeting Informed. In-house. Indispensable. Trends in Electronic The Challenge: Reduce Discovery Source data The Legal Data Universe Automatic Scanning
Recommended publications
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Neoplanet Browser Download Neoplanet 5.1 Build 1262
    neoplanet browser download NeoPlanet 5.1 build 1262. The NeoPlanet Browser was designed to be fun and easy to use and will put the best of the Web at your fingertips. NeoPlanet 5.1 build 1262 Features: · Control your Internet experience by customizing content Channels with favorite websites. · Select your interests from the Preference Center to instantly import content of choice. · Take advantage of powerful E-mail, Download Management, and QuickSearch features. · Don't forget to express your own sense of Internet style with over 500 different skins! This download is marked as adware because it displays advertisement banners or other type of commercials while running. Why is NeoPlanet 5.1 build 1262 flagged as AdWare? · NeoPlanet contains flyswat adware. NeoPlanet security information. You cannot download any crack or serial number for NeoPlanet on this page. Every software that you are able to download on our site is legal. There is no crack, serial number, hack or activation key for NeoPlanet present here. Our collection also doesn't contain any keygens, because keygen programs are being used in illegal ways which we do not support. All software that you can find here is freely downloadable and legal. NeoPlanet installation package is prepared to be downloaded from our fast download servers. It is checked for possible viruses and is proven to be 100% clean and safe. Various leading antiviruses have been used to test NeoPlanet, if it contains any viruses. No infections have been found and downloading NeoPlanet is completelly problem free because of that reason. Our experts on malware detection tested NeoPlanet with various spyware and malware detection programs, including fyxm.net custom malware and spyware detection, and absolutelly no malware or spyware was found in NeoPlanet.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • The Internet and the Web T6 a Technical View of System Analysis and Design
    Technology Guides T1 Hardware T2 Software T3 Data and Databases T4 Telecommunications ᮣ T5 The Internet and the Web T6 A Technical View of System Analysis and Design Technology Guide The Internet 5 and the Web T5.1 What Is the Internet? T5.2 Basic Characteristics and Capabilities of the Internet T5.3 Browsing and the World Wide Web T5.4 Communication Tools for the Internet T5.5 Other Internet Tools T5.1 T5.2 Technology Guide The Internet and the Web T5.1 What Is the Internet?1 The Internet (“the Net”) is a network that connects hundreds of thousands of inter- nal organizational computer networks worldwide. Examples of internal organiza- tional computer networks are a university computer system, the computer system of a corporation such as IBM or McDonald’s, a hospital computer system, or a system used by a small business across the street from you. Participating computer systems, called nodes, include PCs, local area networks, database(s), and mainframes.A node may include several networks of an organization, possibly connected by a wide area network. The Internet connects to hundreds of thousands of computer networks in more than 200 countries so that people can access data in other organizations, and can communicate and collaborate around the globe, quickly and inexpensively. Thus, the Internet has become a necessity in the conduct of modern business. The Internet grew out of an experimental project of the Advanced Research Proj- BRIEF HISTORY ect Agency (ARPA) of the U.S. Department of Defense.The project was initiated in 1969 as ARPAnet to test the feasibility of a wide area computer network over which researchers, educators, military personnel, and government agencies could share data, exchange messages, and transfer files.
    [Show full text]
  • Call Your Netbsd
    Call your NetBSD BSDCan 2013 Ottawa, Canada Pierre Pronchery ([email protected]) May 17th 2013 Let's get this over with ● Pierre Pronchery ● French, based in Berlin, Germany ● Freelance IT-Security Consultant ● OSDev hobbyist ● NetBSD developer since May 2012 (khorben@) Agenda 1.Why am I doing this? 2.Target hardware: Nokia N900 3.A bit of ARM architecture 4.NetBSD on ARM 5.Challenges of the port 6.Current status 7.DeforaOS embedded desktop 8.Future plans 1. A long chain of events ● $friend0 gives me Linux CD ● Computer not happy with Linux ● Get FreeBSD CD shipped ● Stick with Linux for a while ● Play with OpenBSD on Soekris hardware ● $friend1 gets Zaurus PDA ● Switch desktop and laptop to NetBSD ● I buy a Zaurus PDA ● I try OpenBSD on Zaurus PDA 1. Chain of events, continued ● $gf gets invited to $barcamp ● I play with my Zaurus during her presentation ● $barcamp_attender sees me doing this ● Begin to work on the DeforaOS desktop ● Get some of it to run on the Zaurus ● Attend CCC Camp near Berlin during my bday ● $gf offers me an Openmoko Neo1973 ● Adapt the DeforaOS desktop to Openmoko 1. Chain of events, unchained ● $barcamp_attender was at the CCC Camp, too ● We begin to sell the Openmoko Freerunner ● Create a Linux distribution to support it ● Openmoko is EOL'd and we split ways ● $friend2 gives me sparc64 boxes ● Get more involved with NetBSD ● Nokia gives me a N900 during a developer event ● $barcamp_attender points me to a contest ● Contest is about creating an OSS tablet 1. Chain of events (out of breath) ● Run DeforaOS on NetBSD on the WeTab tablet ● Co-win the contest this way ● $friend3 boots NetBSD on Nokia N900 ● Give a talk about the WeTab tablet ● Promise to work on the Nokia N900 next thing ● Apply to BSDCan 2013 ● Taste maple syrup for the first time in Canada ● Here I am in front of you Pictures: Sharp Zaurus Pictures: Openmoko Freerunner Pictures: WeTab Pictures: DeforaOS 2.
    [Show full text]
  • Documento Completo
    UNIVERSIDAD AUTÓNOMA DE CIUDAD JUÁREZ Instituto de Ingeniería y Tecnología Departamento de Ingeniería Eléctrica y Computación Caracterización de firewall de alta disponibilidad con filtro de contenido en un ambiente virtualizado. Reporte Técnico de Investigación presentado por: Alejandra Juana Torres Pérez 98709 Lucero Martínez Castrillo 98750 Requisito para la obtención del título de INGENIERO EN SISTEMAS COMPUTACIONALES Profesor Responsable: Mtro. Eduardo Castillo Luna Mayo de 2015 ii iii iv Índice de contenidos Autorización de Impresión…………………………………………………………....¡Error! Marcador no definido. Declaración de Originalidad………………………………………………………….¡Error! Marcador no definido. Lista de Figuras ... ……………………………………………………………………….viii Lista de Tablas .... ………………………………………………………………………..iix Introducción ......…………………………………………………………………………...1 Capítulo 1. Planteamiento del problema ......………………………………………………2 1.1 Antecedentes ......……………………………………………………………………2 1.2 Definición del problema......………………………………………………………...4 1.3 Objetivos de la investigación .....…………………………………………………....4 1.4 Preguntas de investigación.....……………………………………………………....5 1.5 Justificación de la investigación ....………………………………………………....5 1.6 Limitaciones y delimitaciones de la investigación ....……………………………...6 Capítulo 2. Marco Teórico .....……………………………………………………………..7 2.1 Seguridad informática ....……………………………………………………………7 2.1.1 Tipos de Seguridad……………………………………………………………..8 2.1.2 Seguridad en redes de comunicación………………………………………......9 2.2 Firewall ......………………………………………………………………………..10 2.2.1
    [Show full text]
  • Wearable Personal Data Information Capture System
    University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 12-17-2004 Wearable Personal Data Information Capture System Jiangpeng Shi University of New Orleans Follow this and additional works at: https://scholarworks.uno.edu/td Recommended Citation Shi, Jiangpeng, "Wearable Personal Data Information Capture System" (2004). University of New Orleans Theses and Dissertations. 197. https://scholarworks.uno.edu/td/197 This Thesis is protected by copyright and/or related rights. It has been brought to you by ScholarWorks@UNO with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights- holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. This Thesis has been accepted for inclusion in University of New Orleans Theses and Dissertations by an authorized administrator of ScholarWorks@UNO. For more information, please contact [email protected]. WEARABLE PERSONAL DATA INFORMATION CAPTURE SYSTEM A Thesis Submitted to the Graduate Faculty of the University of New Orleans in partial fulfillment of the requirements for the degree of Master of Science in Department of Computer Science by Jiangpeng Shi B.S., University of International Business and Economy, 2000 B.S., WuHan Technology Institute of Chemistry Equipment and Machine, 1992 December 2004 Table of Contents Chapter 1 Introduction.................................................................................................................. 1 1.1 Wearable Personal Data Information Capture System ......................................... 3 1.2 The Motivation of the Project..............................................................................
    [Show full text]
  • November, 1999
    CADDO-BOSSIER WINDOWS USER GROUP Shreveport – Bossier City Louisiana www.shreveport.com/cbwug Volume 1, No 9 Caddo-Bossier Windows User Group Newsletter November, 1999 GO!ZILLA one finishes to start the next. GO! OUR NEXT MEETING by Mark Reeves ZILLA fixes all those problems and 7 p.m. a few more besides. It is a Thursday November 11, l999 download and connections manager Being in the computer business as a Marshall and Associates system integrator, I am always for the Internet that works with 819 Shreveport-Barksdale Hwy downloading something off the IE4.x and above, plus Netscape 4.x Internet for my clients. Bios up- and above. Shreveport, Louisiana grades, videodriv- Meetings 2nd Thursday of each month ers, etc. My big- If you lose your gest problem is the connection it will poor phone lines restart on command MARK YOUR CALENDAR we have in after you log back Shreveport/ on to the Internet. It Bossier discon- restarts where it left Newsletter reproduction necting me repeatedly. I recently off so you do not have to compliments of Office Depot start over! You can use its had to download on East 70th Street a 46 meg patch file, I had to restart download manager to download downloading 3 times from scratch files in sequence, which is much AFTER I had download 80% of the faster. C-B WUG CLUB ELECTIONS file. My next problem is needing to Our annual election of officers will be download multiple files, so I either (Continued on page 4) held at the December 10 meeting.
    [Show full text]
  • Linux on Cellphones
    Linux on cellphones Pavel Machek Phones are everywhere ● everyone has their cellphone ● and carries it whereever they go ● cellphones are not just phones any more ● they browse web ● can read mail ● play mp3s and videos ● play radio ● they show maps, and you can use them for navigation Phones are sensitive ● They contain your contacts ● ...your passwords ● ...your emails ● ...can eavesdrop on you ● ...can steal your money and transfer them to attacker ● Backups are important because they break down ● non-smart phones do not have adequate ways to backup more than contacts Phones are working against their owner ● Cellphone operators have „interesting“ requirements before they'll sell a cellphone ● Branded phones are actively evil here ● right button takes you right into provider's portal, and you pay for it ● without confirmation ● without chance to change that ● branding is non-removable, so you are stuck with looking at red wallpaper ● you can't use it with other operator ● MMS / push to talk are designed to be expensive ● Voice-over-IP is a big no-no for a phone Phones are working against their owner ● You can only transfer pictures out of a phone using MMS ● You can only download applications using GPRS ● You can't transfer pictures/apps/songs between phones ● Have to confirm actions even of your own apps Phones are limited ● (but maybe that's a good thing?) ● Java applications work everywhere ● but they can't do interresting stuff ● usually can't access microphone, camera ● can't go background ● can't interact with one another ● Symbian
    [Show full text]
  • Effective Web Design, Second Edition
    Effective Web Design Effective Web Design, Second Edition Ann Navarro SYBEX® Associate Publisher: Cheryl Applewood Contracts and Licensing Manager: Kristine O'Callaghan Acquisitions and Developmental Editor: Raquel Baker Editors: Joseph A. Webb, James A. Compton, Colleen Wheeler Strand Production Editor: Dennis Fitzgerald Technical Editor: Marshall Jansen Book Designer: Maureen Forys, Happenstance Type-O-Rama Graphic Illustrator: Tony Jonick Electronic Publishing Specialist: Maureen Forys, Happenstance Type-O-Rama Proofreaders: Nelson Kim, Nancy Riddiough, Leslie E.H. Light Indexer: Ann Rogers CD Coordinator: Christine Harris CD Technician: Kevin Ly Cover Designer: Design Site Cover Illustrator/Photographer: Dan Bowman Copyright © 2001 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. page 1 Effective Web Design The author(s) created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as (author(s)) are attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand- alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. An earlier version of this book was published under the title Effective Web Design © 1998 SYBEX Inc. Library of Congress Card Number: 2001088112 ISBN: 0-7821-2849-1 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc.
    [Show full text]
  • Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc
    Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc. “ Syngress: The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. Unique Passcode 28475016 PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
    [Show full text]