Libraries are bridges to information and knowledge.

CHORLEY LECTURE 2008

The 37th of a series of annual public lectures given under the auspices of The Modern Law Review, in honour of the late Lord Chorley of Kendal

GUNTHER TEUBNER University of Frankfurt Professor of Private Law and Legal Sociology London School of Economics Centennial Visiting Professor

Published by Routledge, Taylor and Francis Group:

The Directory of EU Information Sources

“This is a new seventeenth edition of The Directory of EU Information Sources. It brings together a broad range of information sources, comprising not only the various constituent institutions of the European Union, their personnel, publications, information websites and representations in Europe and the rest of the world, but also diplomatic representation in Brussels, European-level trade and professional associations and NGOs, consultants and lawyers specializing in EU affairs, press agencies, EU grants and loans programmes, and universities offering courses in European integration.”

Never Enough: One Lawyer’s True Story of How He Gambled His Career Away

By Michael J. Burke

“I heartily recommend this book for every lawyer in America and to anyone whose life is being sadly touched by a loved one undergoing an addiction of any kind.”

“For a time, security controls designed to manage spam, viruses, and malware were working. Loud, high-impact attacks abated. But, as a result of this success, the threats they protected against were forced to change. In 2007, many of these threats underwent significant adaptation. Malware went stealth, and the sophistication increased.”

Computerworld Resources, May 26, 2008

To highlight and address these threats and related issues in 2008 and to offer suggestions as to how to cope with them, Cisco and Ironport, two specialists in these areas, have recently published a comprehensive report: 2008 Security Trends: A Report on Emerging Platforms for Spam, Viruses, and Malware.. According to the Introduction to the Report: “This report is designed to help highlight the key security trials in 2008 and suggest ways to defend against the sophisicated generation of internet threats certain to arise in the future.”

Contact Information