I am writing my second book. It will explore the ten laws of security. It will be published by Springer in 2015. The book will describe many examples of real situations illustrating the laws. Some examples will comply with the law, others will violate the laws.
I have already many examples. Nevertheless, the larger the stock of potential examples, the better. Thus, I am looking for examples. If you have examples illustrating one law, and are ready to share it with me, you are welcome. Would it be a new unknown example that I would use in the book, then, of course, you will be cited in the book.
I am also looking for examples:
- Not related to IT
- Historical examples
A votre bon coeur…