The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies...
The book brings together established experts to critically analyse recent developments and case law in online commerce and communications law and policy. The book offers an accessible and informative guide covering several domains of internet law, including: patenting methods of doing business over ..
This book explores the nature of cyber-attacks to demonstrate how the traditional cyber threat-control systems used by nation-states are increasingly ineffective against transnational cyber threats, and how new ways of tackling these attacks can and are being developed. It considers how civilians, b..
This book explores the nature of cyber-attacks to demonstrate how the traditional cyber threat-control systems used by nation-states are increasingly ineffective against transnational cyber threats, and how new ways of tackling these attacks can and are being developed. It considers how civilians, b..
Developing an intuitive and widely-adopted library intranet can be a challenge. Eleven case studies tackle the technical and human factors that must be addressed by web librarians in order to achieve a successful intranet._x005F_x000D_
This book was published as a special issue of the Journal of Web..
Developing an intuitive and widely-adopted library intranet can be a challenge. Eleven case studies tackle the technical and human factors that must be addressed by web librarians in order to achieve a successful intranet._x000D_
This book was published as a special issue of the Journal of Web Libra..
This book includes detailed coverage of intellectual property, contract, encryption and liability issues, including allocation of domain names, use of metatags and other forms of search engine optimisation, digital signatures and the position of ISPs and other intermediaries...
This volume, which features renowned scholars from across the globe, provides critical reflection on the overall emergence of e-research, particularly on its adoption and adaptation by the social sciences and humanities...
This volume, which features renowned scholars from across the globe, provides critical reflection on the overall emergence of e-research, particularly on its adoption and adaptation by the social sciences and humanities...
This book will provide you with the practical information you will need in relation to the many issues and events within the implementation cycle. After reading this book you will be fully equipped and alerted to what is involved in an ERP implementation...
This book will provide you with the practical information you will need in relation to the many issues and events within the implementation cycle. After reading this book you will be fully equipped and alerted to what is involved in an ERP implementation...