HOT YLE英檢

排序依

共有717

International Law

International Law

Any law school graduate will tell you that when picking your outline tool you need to pick the best because your outline......more

Cyberspace Law: Cases and Materials

Cyberspace Law: Cases and Materials

Written by the Director for the newly created Center for Cyberspace Law & Policy at Case Western Reserve University, the......more

Terrorism Online: Politics, Law and Technology

Terrorism Online: Politics, Law and Technology

This book investigates the intersection of terrorism, digital technologies and cyberspace....more

The Liability of Internet Intermediaries

The Liability of Internet Intermediaries

Internet intermediaries play a central role in modern commerce and the dissemination of ideas. Although their economic a......more

The Black Box Society: The Secret Algorithms That Control Money and Information

The Black Box Society: The Secret Algorithms That Control Money and Information

Every day, corporations are connecting the dots about our personal behavior--silently scrutinizing clues left behind by ......more

Internet Law in China

Internet Law in China

A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a comp......more

Locked Down: Practical Information Security for Lawyers

Locked Down: Practical Information Security for Lawyers

In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can atto......more

Cyber Law in Russia

Cyber Law in Russia

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law ......more

Global Data Protection in the Field of Law Enforcement: An EU Perspective

Global Data Protection in the Field of Law Enforcement: An EU Perspective

This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing t......more

Hate Crimes in Cyberspace

Hate Crimes in Cyberspace

Most Internet users are familiar with trolling--aggressive, foul-mouthed posts designed to elicit angry responses in a s......more

Private International Law and the Internet

Private International Law and the Internet

In this, the third edition of Private International Law and the Internet, Professor Dan Svantesson provides a detailed a......more

What Is...Telemedicine?

What Is...Telemedicine?

This book serves as a health law primer and provides an overview of what telemedicine is. Telemedicine services refer to......more

Cyber Law in Argentina

Cyber Law in Argentina

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more

Internet Book Piracy: The Fight to Protect Authors, Publishers, and Our Culture

Internet Book Piracy: The Fight to Protect Authors, Publishers, and Our Culture

"The international battle against Internet pirates has been heating up as ebook publishing gains an ever-larger market s......more

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Your cell phone provider tracks your location and knows who s with you. Your online and in-store purchasing patterns are......more

Cyberethics

Cyberethics

Each new print copy includes Navigate 2 Advantage Access that unlocks a complete eBook, Study Center, homework and Asses......more

Gringras The Laws of the Internet

Gringras The Laws of the Internet

The free flow of information and services around the world via the Internet constantly creates new issues and problems, ......more

Cyber Security Awareness for Lawyers

Cyber Security Awareness for Lawyers

Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organiza......more

Cybersecurity and Human Rights in the Age of Cyberveillance

Cybersecurity and Human Rights in the Age of Cyberveillance

Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from th......more

Privacy, Security and Accountability: Ethics, Law and Policy

Privacy, Security and Accountability: Ethics, Law and Policy

This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions th......more

Privacy, Security and Accountability: Ethics, Law and Policy

Privacy, Security and Accountability: Ethics, Law and Policy

This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions th......more

Who Is Bob_34?: Investigating Child Cyberpornography

Who Is Bob_34?: Investigating Child Cyberpornography

Who Is Bob_34? sheds light on the clandestine world of online child pornography and pedophilia. What exactly do we know ......more

Privacy and Freedom

Privacy and Freedom

"He was the most important scholar of privacy since Louis Brandeis."--Jeffrey Rosen In defining privacy as "the claim of......more

Worldox in One Hour for Lawyers: Includes Gx4

Worldox in One Hour for Lawyers: Includes Gx4

This updated and revised edition from bestselling ABA author and law-firm technology expert John Heckman covers the newl......more

Principles of Cybercrime

Principles of Cybercrime

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows o......more

Principles of Cybercrime

Principles of Cybercrime

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows o......more

Who Is Bob_34?: Investigating Child Cyberpornography

Who Is Bob_34?: Investigating Child Cyberpornography

Who Is Bob_34? sheds light on the clandestine world of online child pornography and pedophilia. What exactly do we know ......more

Confronting Internet’s Dark Side

Confronting Internet’s Dark Side

Terrorism, cyberbullying, child pornography, hate speech, cybercrime: along with unprecedented advancements in productiv......more

Confronting the Internet’s Dark Side: Moral and Social Responsibility on the Free Highway

Confronting the Internet’s Dark Side: Moral and Social Responsibility on the Free Highway

Terrorism, cyberbullying, child pornography, hate speech, cybercrime: along with unprecedented advancements in productiv......more

Law, Privacy and Surveillance in Canada in the Post-Snowden Era

Law, Privacy and Surveillance in Canada in the Post-Snowden Era

Years of surveillance-related leaks from US whistleblower Edward Snowden have fueled an international debate on privacy,......more

Internet Governance: Origins, Current Issues, and Future Possibilities

Internet Governance: Origins, Current Issues, and Future Possibilities

Internet Governance: Origins, Current Issues, and Future Possibilities provides an introductory, multidisciplinary accou......more

Terrorism Online: Politics, Law and Technology

Terrorism Online: Politics, Law and Technology

This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-t......more

Cyber Law in Ireland

Cyber Law in Ireland

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more

Data and Goliath:The Hidden Battles to Capture Your Data and Control Your World

Data and Goliath:The Hidden Battles to Capture Your Data and Control Your World

Your cell phone provider tracks your location and knows who s with you. Your online and in-store purchasing patterns are......more

The Global War for Internet Governance

The Global War for Internet Governance

A groundbreaking study of one of the most crucial yet least understood issues of the twenty-first century: the governanc......more

Routledge Handbook of Media Law

Routledge Handbook of Media Law

Featuring specially commissioned chapters from experts in the field of media and communications law, this book provides ......more

The Black Box Society: The Secret Algorithms That Control Money and Information

The Black Box Society: The Secret Algorithms That Control Money and Information

Every day, corporations are connecting the dots about our personal behavior--silently scrutinizing clues left behind by ......more

Asian Data Privacy Laws: Trade & Human Rights Perspectives

Asian Data Privacy Laws: Trade & Human Rights Perspectives

Now in paperback format, this is the first work to examine data privacy laws across Asia, covering all 26 countries and ......more

Cyber Law in Sweden

Cyber Law in Sweden

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more

The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives

The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives

The Internet’s rapid diffusion and digitization of economic activities have led to the emergence of a new breed of crimi......more

Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions

Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions

Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirement......more

Cyber Law in Hong Kong

Cyber Law in Hong Kong

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law and#8211; ......more

Information Technology and Law

Information Technology and Law

This book is addressed to all who are interested in the interplay between Information Technology and law. It constitutes......more

Made in Africa: A Discussion on the Role of Law in Absorptive Capacity in African Software Industries

Made in Africa: A Discussion on the Role of Law in Absorptive Capacity in African Software Industries

An information and communication technology (ICT) revolution is underway in Africa. New possibilities have been created ......more

Social Networking: Law, Rights and Policy

Social Networking: Law, Rights and Policy

This book examines one of the greatest social and legal concerns of the modern age: social networking and the internet. ......more

Private Copying

Private Copying

This book offers an original analysis of private copying and determines its actual scope as an area of end-user freedom.......more

8上一頁 1 2 3 4 5 6 7 8 下一頁 跳到

外文書書籍分類