ch. 2. An explanation of the internet, computers, and data mining
ch. 4. Informational privacy : the general theory
ch. 5. Informational privacy : norms and value optimality
ch. 6. Software vulnerabilities and the low-priced software norm
ch. 7. Software vulnerabilities : creating best practices
ch. 8. Computers and networks : attack and defense
ch. 9. Malware, norms, and ISPs
ch. 10. Malware : creating a best practices norm
ch. 11. Tracking, contracting, and behavioral advertising
ch. 12. From one-sided chicken to value optimal norms