Search

William Alan Sobel

from Los Angeles, CA
Age ~79

William Sobel Phones & Addresses

  • 1930 Sprucewood Ln, Los Angeles, CA 90077 (424) 248-0364
  • Frazier Park, CA
  • Woodland Hills, CA
  • 23921 Aspen Way, Calabasas, CA 91302 (310) 475-8736 (818) 876-9193 (818) 876-9194
  • 23801 Calabasas Rd, Calabasas, CA 91302 (818) 225-7093
  • 23901 Calabasas Rd, Calabasas, CA 91302 (818) 225-7093
  • West Hills, CA
  • Torrance, CA
  • Beverly Hills, CA

Work

Company: Always 7 day locks & locksmith Address: 9255 W Sunset Blvd Ph, Los Angeles, CA 90069 Phones: (310) 405-6374 Position: Manager Industries: Legal Services

Education

School / High School: Osgoode Hall Law School, York University

Ranks

Licence: California - Active Date: 1983

Specialities

Entertainment Law • Communications & Media • General Practice

Professional Records

Medicine Doctors

William Sobel Photo 1

William David Sobel

View page
Specialties:
Psychiatry
Addiction Psychiatry
Education:
University of California at Davis (1991)

Lawyers & Attorneys

William Sobel Photo 2

William Richard Sobel, Los Angeles CA - Lawyer

View page
Address:
9255 Sunset Blvd #800, Los Angeles, CA 90069
(310) 274-6184 (Office)
Licenses:
California - Active 1983
Education:
Osgoode Hall Law School, York University
William Sobel Photo 3

William Sobel - Lawyer

View page
Office:
Edelstein, Laird & Sobel, LLP
Specialties:
Entertainment Law
Communications & Media
General Practice
ISLN:
903568843
Admitted:
1983
University:
University of Toronto, B.A., 1979
Law School:
Osgoode Hall Law School, York University, LL.B., 1982

Resumes

Resumes

William Sobel Photo 4

William Sobel

View page
Location:
Greater Los Angeles Area
Industry:
Computer Software
William Sobel Photo 5

William Sobel

View page
William Sobel Photo 6

William Sobel

View page

Business Records

Name / Title
Company / Classification
Phones & Addresses
William Sobel
Manager
Always 7 Day Locks & Locksmith
Legal Services
9255 W Sunset Blvd Ph, Los Angeles, CA 90069
William Sobel
Manager
Always 7 Day Locks & Locksmith
Legal Services
9255 W Sunset Blvd Ph, Los Angeles, CA 90069
William A. Sobel
Quito Lane Project - Lot 5, A California Limited Partnership
1661 N Beverly Gln Blvd, Los Angeles, CA 90077
William A. Sobel
Tierra Del Cielo LLC
Real Estate
1901 Ave Of The Stars, Los Angeles, CA 90067
William A. Sobel
Canyon Properties LLC
Residential Lots
23921 Aspen Way, Calabasas, CA 91302
William A. Sobel
Shady Glen Properties LLC
Real Estate Investment
23921 Aspen Way, Calabasas, CA 91302
William D. Sobel
ILOCALNEWS, LLC
William Sobel
Owner
William Alan Sobel, Attorney
Legal Services Office
23801 Calabasas Rd, Calabasas, CA 91302
William Alan Sobel
President
WILLIAM ALAN SOBEL, A LAW CORPORATION
23901 Calabasas Rd #2005, Calabasas, CA 91302

Publications

Us Patents

Storage Of Reverse Delta Updates

View page
US Patent:
6349311, Feb 19, 2002
Filed:
Feb 1, 1999
Appl. No.:
09/241794
Inventors:
William E. Sobel - Cypress CA
Carey S. Nachenberg - Northridge CA
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 1200
US Classification:
707203
Abstract:
A computer readable file of a first state ( ) is updated to a second state ( ) through the use of an incremental update ( ) which provides the information necessary to construct the file of the second version ( ) from a file of the first version ( ). In order to allow for future access to the first version ( ), without maintaining a copy of the file of the first version ( ), a back-update file ( ) is created. The back-update file ( ) provides the information necessary to construct a file of the first state ( ) from a file of the second state ( ).

Thwarting Malicious Registry Mapping Modifications And Map-Loaded Module Masquerade Attacks

View page
US Patent:
6785818, Aug 31, 2004
Filed:
Jan 14, 2000
Appl. No.:
09/483536
Inventors:
William E. Sobel - Stevenson Ranch CA
David Grawrock - Aloha OR
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 1214
US Classification:
713200, 713187
Abstract:
Apparati, computer-implemented methods, and computer-readable media for thwarting map-loaded module ( ) attacks on a digital computer ( ). Within the computer ( ) is an intermediate location such as a registry ( ) containing mappings from generic names ( ) of map-loaded modules ( ) to specific locations ( ) of the map-loaded modules ( ). Coupled to the intermediate location ( ) is a monitor module ( ) adapted to monitor attempts to replace existing mappings ( ) of map-loaded modules ( ) with replacement mappings ( ). Coupled to the map-loaded modules ( ) is a file system monitor;module ( ) adapted to monitor attempts to insert new map-loaded modules ( ) into the computer ( ). Coupled to the monitor module ( ) and to the file system monitor module ( ) is a programmable control module ( ) adapted to determine when a change in mapping constitutes a malicious code attack.

File Usage History Log For Improved Placement Of Files In Differential Rate Memory According To Frequency Of Utilizations And Volatility Of Allocation Space

View page
US Patent:
7124272, Oct 17, 2006
Filed:
Apr 18, 2003
Appl. No.:
10/418476
Inventors:
Mark K. Kennedy - Redondo Beach CA, US
William Sobel - Cypress CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 12/00
US Classification:
711173
Abstract:
Improved file tracking methods and file re-positioning or file defragmenting mechanisms are disclosed for use with a differential rate memory device which has allocatable storage units disposed in regions of comparatively faster data access and of comparatively slower data access for storing retrievable data file contents in such regions.

Alteration Of Module Load Locations

View page
US Patent:
7155741, Dec 26, 2006
Filed:
May 6, 2002
Appl. No.:
10/140149
Inventors:
William E Sobel - Stevenson Ranch CA, US
Bruce McCorkendale - Los Angeles CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
H04L 9/00
US Classification:
726 22
Abstract:
Buffer overflow attacks are prevented by altering the load locations of commonly used executable code modules. A monitor layer () is associated with an operating system () and controls the load locations for predetermined modules containing executable code that can be used in the execution of buffer overflow attacks. The monitor layer () applies predetermined criteria to determine whether a module () presents a high risk for enabling a buffer overflow attack. If the monitor layer () determines that the module () presents a high risk, the monitor layer () may force the module () to load in an alternate location () by reserving sections of memory () into which the module normally loads. Alternatively, the monitor layer () may alter the area of the module that directs the operating system () to load it into a particular location (), thus causing the operation system to load the module to an alternate location ().

Heuristic Detection And Termination Of Fast Spreading Network Worm Attacks

View page
US Patent:
7159149, Jan 2, 2007
Filed:
Oct 24, 2002
Appl. No.:
10/280586
Inventors:
Mark Spiegel - West Hills CA, US
Bruce McCorkendale - Los Angeles CA, US
William Sobel - Stevenson Ranch CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 11/00
US Classification:
714 43, 726 22, 726 23, 726 24, 709224
Abstract:
Methods, apparati, and computer program products for detecting and responding to fast-spreading network worm attacks include a network monitoring module (), which observes () failed network connection attempts from multiple sources. A logging module () logs () the failed connection attempts. An analysis module () uses the logged data on the failed connection attempts to determine () whether a sources is infected with a worm using a set of threshold criteria. The threshold criteria indicate whether a source's failed connection attempts are non-normal. In one embodiment, a response module () responds () to the computer worm by, e. g. , alerting a user or system administrator, terminating an infected process (), or terminating the infected source's network access.

Enforcement Of Compliance With Network Security Policies

View page
US Patent:
7249187, Jul 24, 2007
Filed:
Nov 27, 2002
Appl. No.:
10/305622
Inventors:
William E Sobel - Stevenson Ranch CA, US
Greg Vogel - Chatsworth CA, US
Bruce McCorkendale - Los Angeles CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 15/16
US Classification:
709229, 709227, 726 3, 726 4
Abstract:
Methods, apparati, and computer program products enforce computer network security policies by assigning network membership to a client () based on the client's compliance with the security policies. When a client () requests () a network address, the DHCP proxy () intercepts the request and assigns () that client () a logical address on the protected network () if the client () is in compliance with the security policies. If the client () is not in compliance with the security policies, in various embodiments, the DHCP proxy () assigns () the client () an address on a restricted network () or no network address at all.

Antivirus Scanning In A Hard-Linked Environment

View page
US Patent:
7260847, Aug 21, 2007
Filed:
Oct 24, 2002
Appl. No.:
10/280663
Inventors:
William Sobel - Stevenson Ranch CA, US
Bruce McCorkendale - Los Angeles CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 12/14
G06F 15/00
H04L 9/00
US Classification:
726 24, 713165, 713166, 713167, 713188, 726 1
Abstract:
Computer-implemented methods, apparati, and computer-readable media for detecting malicious computer code in a file () associated with a computer (). A method of the present invention comprises the steps of determining whether there is more than one hard link () to the file (); and when there is more than one hard link (), ascertaining the identities of all the hard links (), and performing an antivirus scan on the file () based upon the hard link(s) () having the most restrictive scanning criteria of all the hard links (), or upon the union of scanning criteria amongst all the hard links ().

System Utilizing Updated Spam Signatures For Performing Secondary Signature-Based Analysis Of A Held E-Mail To Improve Spam Email Detection

View page
US Patent:
7293063, Nov 6, 2007
Filed:
Jun 4, 2003
Appl. No.:
10/455014
Inventors:
William E Sobel - Stevenson Ranch CA, US
Assignee:
SYMANTEC Corporation - Cupertino CA
International Classification:
G06F 15/16
US Classification:
709206, 709207, 726 23, 726 24
Abstract:
A spam manager () receives () at least one e-mail () addressed to a domain (). The spam manager () performs () a signature based analysis of received e-mail () to determine whether received e-mail () includes at least one signature indicative of spam. Responsive to the spam manager () identifying e-mail () that does not include at least one signature indicative of spam and to a timeout period not having transpired from a time of receipt of the e-mail () by the spam manager (), the spam manager () performs () at least one secondary analysis of the identified e-mail ().

Amazon

The Illustrated Longitude: The True Story Of A Lone Genius Who Solved The Greatest Scientific Problem Of His Time

The Illustrated Longitude: The True Story of a Lone Genius Who Solved the Greatest Scientific Problem of His Time

View page

A fully illustrated edition of the international best-seller Longitude.The Illustrated Longitude recounts in words and images the epic quest to solve the greatest scientific problem of the eighteenth and three prior centuries: determining how a captain could pinpoint his ship's location at sea. All ...

Author

Dava Sobel, William J. H. Andrewes

Binding

Paperback

Pages

216

Publisher

Walker Books

ISBN #

0802775934

EAN Code

9780802775931

ISBN #

2

Essentials Of Clinical Mycology

Essentials of Clinical Mycology

View page

Clinical Mycology offers a comprehensive review of this discipline. Organized by types of fungi, this volume covers microbiologic, epidemiologic and demographic aspects of fungal infections as well as diagnostic, clinical, therapeutic, and preventive approaches. Special patient populations are also ...

Binding

Hardcover

Pages

553

Publisher

Springer

ISBN #

1441966390

EAN Code

9781441966391

ISBN #

6

The Illustrated Longitude: The True Story Of A Lone Genius Who Solved The Greatest Scientific Problem Of His Time By Dava Sobel, William J. H. Andrewes (2003) Paperback

The Illustrated Longitude: The True Story of a Lone Genius Who Solved the Greatest Scientific Problem of His Time by Dava Sobel, William J. H. Andrewes (2003) Paperback

View page

Brand New. Will be shipped from US.

Binding

Paperback

Publisher

Walker & Company

ISBN #

8

The Illustrated Longitude: The True Story Of A Lone Genius Who Solved The Greatest Scientific Problem Of His Time By Dava Sobel, William J. H. Andrewes (2003) Paperback

The Illustrated Longitude: The True Story of a Lone Genius Who Solved the Greatest Scientific Problem of His Time by Dava Sobel, William J. H. Andrewes (2003) Paperback

View page

Will be shipped from US

Author

William J. H. Andrewes Dava Sobel

Binding

Paperback

Publisher

Walker & Company

ISBN #

10

Algebra: Its Elements and Structure

View page

This is in perfect shape

Author

J. Houston Banks, Max A. Sobel, William C. Walsh

Binding

Hardcover

Publisher

McGraw-Hill Inc.

ISBN #

0070036667

EAN Code

9780070036666

ISBN #

5

William Alan Sobel from Los Angeles, CA, age ~79 Get Report