HOT YLE英檢

排序依

共有717

Cyber Crime

Cyber Crime

Cyber Crime, Second Edition by Catherine D. Marcum, provides the reader with a thorough examination of the prominence of......more

The Mastermind: Drugs. Empire. Murder. Betrayal.

The Mastermind: Drugs. Empire. Murder. Betrayal.

The incredible true story of the decade-long quest to bring down Paul Le Roux--the creator of a frighteningly powerful I......more

Digital Copyright: Law and Practice

Digital Copyright: Law and Practice

The first edition of this book in 2002 was the first UK text to examine digital copyright together with related areas su......more

The Platform Economy: Unravelling the Legal Status of Online Intermediaries

The Platform Economy: Unravelling the Legal Status of Online Intermediaries

In this book, a panel of international legal experts unravel the legal status of online intermediaries - a thorny knot t......more

When an Original Is Not Original: The Originality Requirement in Belgian Law

When an Original Is Not Original: The Originality Requirement in Belgian Law

This book analyses a select number of incarnations of the originality requirement in different branches of Belgian law i......more

Cyber Espionage and International Law

Cyber Espionage and International Law

The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monogr......more

Intermediary Liability and Freedom of Expression in the EU: From Concepts to Safeguards

Intermediary Liability and Freedom of Expression in the EU: From Concepts to Safeguards

States increasingly delegate regulatory and police functions to internet intermediaries. This may lead to interference w......more

Law, Policy and the Internet

Law, Policy and the Internet

This comprehensive textbook by the editor of Law and the Internet seeks to provide students, practitioners and businesse......more

Gringras: The Laws of the Internet

Gringras: The Laws of the Internet

The free flow of information and services around the world via the Internet constantly creates new issues and problems, ......more

A concise introduction to the NIS Directive - A pocket guide for digital service providers

A concise introduction to the NIS Directive - A pocket guide for digital service providers

This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems......more

Industry of Anonymity: Inside the Business of Cybercrime

Industry of Anonymity: Inside the Business of Cybercrime

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more

Industry of Anonymity: Inside the Business of Cybercrime

Industry of Anonymity: Inside the Business of Cybercrime

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more

Industry of Anonymity: Inside the Business of Cybercrime

Industry of Anonymity: Inside the Business of Cybercrime

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more

Telecommunications Law and Regulation

Telecommunications Law and Regulation

Since the last edition of this book was published, numerous changes have occurred in the telecommunications sector, at a......more

Industry of Anonymity: Inside the Business of Cybercrime: Includes PDF with Charts and Appendixes

Industry of Anonymity: Inside the Business of Cybercrime: Includes PDF with Charts and Appendixes

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more

Cyber Security: Law and Guidance

Cyber Security: Law and Guidance

Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and......more

Cyber Law in Argentina

Cyber Law in Argentina

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law ......more

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather th......more

Intellectual Property and the Regualtion of the Internet

Intellectual Property and the Regualtion of the Internet

The internet has transformed creative and innovative pursuits for economic gain or otherwise. Yet flow-on complications ......more

Global Data Protection in the Field of Law Enforcement: An Eu Perspective

Global Data Protection in the Field of Law Enforcement: An Eu Perspective

This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing t......more

Data Protection: A Practical Guide to UK and EU Law

Data Protection: A Practical Guide to UK and EU Law

Now in its fifth edition, this invaluable handbook provides a complete guide to the practical application of data protec......more

Privacy’s Blueprint: The Battle to Control the Design of New Technologies

Privacy’s Blueprint: The Battle to Control the Design of New Technologies

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillanc......more

Blockchain and the Law: The Rule of Code

Blockchain and the Law: The Rule of Code

Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred ......more

Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet’’s Evil Twin

Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet’’s Evil Twin

Dark... A kingpin willing to murder to protect his dark web drug empire. A corrupt government official determined to avo......more

Legal Guide to Video Game Development

Legal Guide to Video Game Development

This authoritative handbook takes you through the legal maze of producing a video game, from the moment you get the orig......more

A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology

A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relatio......more

Information and Communications Technology Law in Ireland

Information and Communications Technology Law in Ireland

Information and Communications Technology Law in Ireland will be an essential companion for undergraduate and postgradua......more

Legal Protection for Computer-Implemented Inventions: A Practical Guide to Software-Related Patents

Legal Protection for Computer-Implemented Inventions: A Practical Guide to Software-Related Patents

About this book: Legal Protection for Computer-Implemented Inventions provides an overview of the current status of comp......more

Inside the Enemy’s Computer: Identifying Cyber Attackers

Inside the Enemy’s Computer: Identifying Cyber Attackers

Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal ......more

EU General Data Protection Regulation (GDPR): An implementation and compliance guide

EU General Data Protection Regulation (GDPR): An implementation and compliance guide

An in-depth guide to complying with the EU GDPR. Now in its second edition, EU GDPR - An Implementation and Compliance G......more

Cyber Law in the United Kingdom

Cyber Law in the United Kingdom

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law ......more

The Lawyer’s Guide to Marketing on the Internet

The Lawyer’s Guide to Marketing on the Internet

Transform your website, e-mail, social media, and overall online marketing strategy Get closer to your target prospects ......more

Creating an Online Publishing Strategy for Law Firms

Creating an Online Publishing Strategy for Law Firms

Publishing may very well be the oldest form of legal marketing, but because it s so simple to do, it s easy to get wrong......more

Tomorrow’s Lawyers: An Introduction to Your Future

Tomorrow’s Lawyers: An Introduction to Your Future

Tomorrow’s Lawyers predicts that we are at the beginning of a period of fundamental transformation in law: a time in whi......more

Copyright in the Age of Online Access: Alternative Compensation Systems in EU Law

Copyright in the Age of Online Access: Alternative Compensation Systems in EU Law

Features: Extensive treatment of restrictions on exclusive rights in EU copyright law. Comprehensive description of the ......more

European Software Directives and European Software Patents

European Software Directives and European Software Patents

Derived from the renowned multi-volume International Encyclopaedia of Laws, this monograph provides a survey and analysi......more

Cyber Security: Law and Practice

Cyber Security: Law and Practice

Cyber security and data management are among the biggest issues facing businesses and organisations today. The law faces......more

Digital Copyright

Digital Copyright

The general public is used to thinking of copyright (if it thinks of it at all) as marginal and arcane. But copyright is......more

Digital Justice: Technology and the Internet of Disputes

Digital Justice: Technology and the Internet of Disputes

Improving access to justice has been an ongoing process, and on-demand justice should be a natural part of our increasin......more

E-Lawyer: A Guide to Legal Practice Leadership in the Internet Age

E-Lawyer: A Guide to Legal Practice Leadership in the Internet Age

If you feel bewildered by the rapidly shifting dynamics of legal practice in the digital age, you are not alone. The Mil......more

Network Neutrality: From Policy to Law to Regulation

Network Neutrality: From Policy to Law to Regulation

This book explains net neutrality battles in Europe, the United States and in developing countries such as India. He exp......more

Social Media and the Law: A Guidebook for Communication Students and Professionals

Social Media and the Law: A Guidebook for Communication Students and Professionals

Social media platforms like Facebook, Twitter, Instagram, YouTube, and Snapchat allow users to connect with one another ......more

Social Media and the Law: A Guidebook for Communication Students and Professionals

Social Media and the Law: A Guidebook for Communication Students and Professionals

Social media platforms like Facebook, Twitter, Instagram, YouTube, and Snapchat allow users to connect with one another ......more

Technology Tips for Lawyers and Other Business Professionals

Technology Tips for Lawyers and Other Business Professionals

The importance of technology in our professional and personal lives continues to grow at an ever-increasing rate. Courts......more

Computer Forensics and Digital Evidence

Computer Forensics and Digital Evidence

Computer Forensics and Digital Evidence explains the relevance of computer forensics within investigations related to cr......more

Network Neutrality: From Policy to Law to Regulation

Network Neutrality: From Policy to Law to Regulation

Net neutrality is the most contested Internet access policy of our time. This book offers an in-depth explanation of the......more

Social Networks as the New Frontier of Terrorism: #Terror

Social Networks as the New Frontier of Terrorism: #Terror

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to al......more

Digital Evidence Changing the Paradigm of Human Rights Protection

Digital Evidence Changing the Paradigm of Human Rights Protection

The wide diffusion of cameras and videos that allows for the documentation of human rights abuses raises new needs, incl......more

Navigating EU Privacy and Data Protection Laws

Navigating EU Privacy and Data Protection Laws

With global businesses and companies struggling to meet varying EU national privacy compliance laws, this book will be a......more

The Right to Be Forgotten: Privacy and the Media in the Digital Age

The Right to Be Forgotten: Privacy and the Media in the Digital Age

The human race now creates, distributes and stores more information than at any other time in history. Frictionless and ......more

8上一頁 1 2 3 4 5 6 7 8 下一頁 跳到

外文書書籍分類