Cyber Crime, Second Edition by Catherine D. Marcum, provides the reader with a thorough examination of the prominence of......more
...more
The incredible true story of the decade-long quest to bring down Paul Le Roux--the creator of a frighteningly powerful I......more
...more
The first edition of this book in 2002 was the first UK text to examine digital copyright together with related areas su......more
In this book, a panel of international legal experts unravel the legal status of online intermediaries - a thorny knot t......more
This book analyses a select number of incarnations of the originality requirement in different branches of Belgian law i......more
...more
...more
...more
...more
...more
The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monogr......more
States increasingly delegate regulatory and police functions to internet intermediaries. This may lead to interference w......more
...more
...more
This comprehensive textbook by the editor of Law and the Internet seeks to provide students, practitioners and businesse......more
The free flow of information and services around the world via the Internet constantly creates new issues and problems, ......more
Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans infor......more
...more
This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems......more
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more
Since the last edition of this book was published, numerous changes have occurred in the telecommunications sector, at a......more
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, dee......more
...more
...more
...more
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and......more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law ......more
...more
...more
...more
...more
The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather th......more
The internet has transformed creative and innovative pursuits for economic gain or otherwise. Yet flow-on complications ......more
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing t......more
...more
Now in its fifth edition, this invaluable handbook provides a complete guide to the practical application of data protec......more
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillanc......more
Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred ......more
...more
Dark... A kingpin willing to murder to protect his dark web drug empire. A corrupt government official determined to avo......more
...more
...more
This authoritative handbook takes you through the legal maze of producing a video game, from the moment you get the orig......more
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relatio......more
...more
...more
Information and Communications Technology Law in Ireland will be an essential companion for undergraduate and postgradua......more
...more
...more
About this book: Legal Protection for Computer-Implemented Inventions provides an overview of the current status of comp......more
Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal ......more
An in-depth guide to complying with the EU GDPR. Now in its second edition, EU GDPR - An Implementation and Compliance G......more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law ......more
...more
Transform your website, e-mail, social media, and overall online marketing strategy Get closer to your target prospects ......more
...more
Publishing may very well be the oldest form of legal marketing, but because it s so simple to do, it s easy to get wrong......more
...more
...more
Tomorrow’s Lawyers predicts that we are at the beginning of a period of fundamental transformation in law: a time in whi......more
Features: Extensive treatment of restrictions on exclusive rights in EU copyright law. Comprehensive description of the ......more
Derived from the renowned multi-volume International Encyclopaedia of Laws, this monograph provides a survey and analysi......more
Cyber security and data management are among the biggest issues facing businesses and organisations today. The law faces......more
...more
...more
The general public is used to thinking of copyright (if it thinks of it at all) as marginal and arcane. But copyright is......more
Improving access to justice has been an ongoing process, and on-demand justice should be a natural part of our increasin......more
If you feel bewildered by the rapidly shifting dynamics of legal practice in the digital age, you are not alone. The Mil......more
This book explains net neutrality battles in Europe, the United States and in developing countries such as India. He exp......more
Social media platforms like Facebook, Twitter, Instagram, YouTube, and Snapchat allow users to connect with one another ......more
Social media platforms like Facebook, Twitter, Instagram, YouTube, and Snapchat allow users to connect with one another ......more
...more
The importance of technology in our professional and personal lives continues to grow at an ever-increasing rate. Courts......more
Computer Forensics and Digital Evidence explains the relevance of computer forensics within investigations related to cr......more
...more
Net neutrality is the most contested Internet access policy of our time. This book offers an in-depth explanation of the......more
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to al......more
This volume presents the findings of research into profiling. The aim of the research is to identify and tackle the chal......more
The wide diffusion of cameras and videos that allows for the documentation of human rights abuses raises new needs, incl......more
...more
...more
With global businesses and companies struggling to meet varying EU national privacy compliance laws, this book will be a......more
The human race now creates, distributes and stores more information than at any other time in history. Frictionless and ......more