Vi bøger
Levering: 1 - 2 hverdage

Lovgivning om IT og kommunikation

Her finder du spændende bøger om Lovgivning om IT og kommunikation. Nedenfor er et flot udvalg af over 159 bøger om emnet. Det er også her du finder emner som Postlovgivning.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Deepanjali Mishra
    1.477,95 kr.

    This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security. The book contains three basic sections namely: the concept of digital violence in policy and practice; the impact of digital violence; and the implication of cyber security to curb such violence. The intention of this book is to equip researchers, practitioners, faculties, and students with critical, practical, and ethical resources to use cyber security and related technologies to help curb digital violence and to support victims. It brings about the needs of technological based education in order to combat gendered crimes like cyberbullying, body-shaming, and trolling that are a regular phenomenon on social media platforms. Topics include societal implications of cyber feminism; technology aided communication in education; cyber security and human rights; governance of cyber law throughinternational laws; and understanding digital violence.

  • af Aifang Ma
    1.295,95 kr.

    This book explores the dynamics of the Chinese regulation of internet firms. Sitting at the crossroad of regulation studies, communication studies, political economy, and the social movements, it conceptualises China as a ¿double-bind regulatory state¿, defined as a two-step autonomy-enabling process. First, the party-state¿s pursuit of competiting objectives creates a predicament for regulators. In the second step, private internet firms consciously exploit regulators¿ predicament to enlarge their maneuvering room. The approach of ¿double-bind regulatory state¿ challenges some current academic accounts that exaggerate the capacity of the Chinese party-state to establish seamless control. This book is of interest to scholars of Chinese politics, digital law, political economy, and more.

  • af Kristan Stoddart
    1.179,95 kr.

  • af Mark Dery
    172,95 kr.

  • af Iman Almomani
    858,95 kr.

    This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

  • af Holger Kaschner
    500,95 kr.

  • af It Governance Publishing
    257,95 kr.

    Buy this book today and understand how to maximise the benefits of the CISO's role in your organization!

  • af David Hans
    622,95 kr.

    Risiko & Recht macht es sich zur Aufgabe, Rechtsfragen der modernen Risikogesellschaft zu analysieren. Berücksichtigung finden Entwicklungen in verschiedensten Gebieten, von denen Sicherheitsrisiken für Private, die öffentliche Ordnung, staatliche Einrichtungen und kritische Infrastrukturen ausgehen. Zu neuartigen Risiken führt zuvorderst der digitale Transformationsprozess und der damit verbundene Einsatz künstlicher Intelligenz; des Weiteren hat die Covid-Pandemie Risikopotentiale im Gesundheitssektor verdeutlicht und auch der Klimawandel zwingt zu umfassenderen Risikoüberlegungen; schliesslich geben gesellschaftliche Entwicklungen, u.a. Subkulturenbildung mit Gewaltpotential, Anlass zu rechtlichen Überlegungen. Risiko und Recht greift das breite und stets im Wandel befindliche Spektrum neuartiger Risikosituationen auf und beleuchtet mit Expertenbeiträgen die rechtlichen Herausforderungen unserer Zeit.

  • af Andreas Maximilian Nolte (Hrsg.
    552,95 kr.

    Die kompakten Vorschriftensammlungen vom Fachverlag Europäisches Compliancerecht: Übersichtlich, aktuell und handlich.Inhalt:Bayerisches Datenschutzgesetz (BayDSG)Datenschutzgrundverordnung (DS-GVO)Bundesdatenschutzgesetz n. F. (BDSG-n.F.)Telekommunikation-Telemedien-Datenschutz-Gesetz (TTDSG)Dienstordnung für Lehrkräfte an staatlichen Schulen in Bayern (Lehrerdienstordnung ¿ LDO) (Auszug)Gesetz über die Digitalisierung im Freistaat Bayern (Bayerisches Digitalgesetz ¿ BayDiG) (Auszug)

  • af Geoff White
    222,95 kr.

    'Rinsed is a triumph. If you want to understand how the chaotic world around us really works, read this book!'MILES JOHNSON, AUTHOR OF CHASING SHADOWS'A gripping look at the battle between cops and criminals on the new frontier of financial crime'BRADLEY HOPE, CO-AUTHOR OF BILLION DOLLAR WHALE For as long as people have been stealing money, there has been an industry ready to wash it. But what happened when our economy went digital? How does the global underworld wash its dirty money in the Internet age?Rinsed reveals how organized crooks have joined forces with the world's most sophisticated cybercriminals. The result: a vast virtual money-laundering machine too intelligent for most authorities to crack. Through a series of jaw-dropping cases and interviews with insiders at all levels of the system, Geoff White shows how thieves are uniting to successfully get away with the most atrocious crimes on an unprecedented scale.The book follows money from the outrageous luxury of Dubai hotels to sleepy backwaters of coastal Ireland, from the backstreets of Nigeria to the secretive zones of North Korea, to investigate this new cyber supercartel. Through first-hand accounts from the victims of their devastating crimes, White uncovers the extraordinary true story of hi-tech laundering - and exposes its terrible human cost.'Rinsed is as twisty, colourful and terrifyingly eye-opening as the people White investigates. You'll never look at wealth, technology and crime in the same way'CARA MCGOOGAN, AUTHOR OF THE POISON LINE

  • af Rafeal Mechlore
    337,95 kr.

    In the digital age, where our lives are increasingly intertwined with technology, the realm of cyberspace has become a breeding ground for both innovation and criminal activity. "Bytes and Crimes: Navigating Online Threats" is a timely exploration of the complex and evolving landscape of cybersecurity, offering insights into the threats that lurk in the virtual world and strategies to safeguard against them.The Digital Frontier:Our reliance on the internet and technology has ushered in unprecedented convenience and connectivity. However, this interconnectedness has also given rise to a new breed of criminals who exploit vulnerabilities in the digital ecosystem for personal gain. From identity theft and financial fraud to cyberbullying and hacking, the spectrum of online threats is vast and multifaceted.Understanding Cyber Threats:To effectively navigate the digital realm, it is essential to comprehend the nature of cyber threats. "Bytes and Crimes" delves into various forms of cybercrime, such as phishing attacks, ransomware, and data breaches. It sheds light on the motivations behind these crimes, which can range from financial gain to political agendas, and the tactics employed by cybercriminals to achieve their objectives.Safeguarding Your Digital Presence:This exploration of online threats is not meant to invoke fear but to empower individuals and businesses with knowledge and tools to protect themselves. "Bytes and Crimes" provides valuable insights into cybersecurity best practices, emphasizing the importance of strong passwords, regular software updates, and the use of antivirus software. It also highlights the critical role of user awareness in thwarting cyber threats, as human error often plays a significant role in successful cyberattacks.Emerging Technologies and Risks:As technology continues to advance, so do the threats associated with it. The program discusses emerging technologies such as the Internet of Things (IoT) and artificial intelligence and their associated security challenges. It also touches on the implications of privacy concerns and the ethical dimensions of cybersecurity in an era of data-driven decision-making.Cybersecurity as a Collective Responsibility:"Bytes and Crimes" underscores that cybersecurity is not solely the responsibility of IT professionals and law enforcement agencies. It is a collective effort that involves individuals, organizations, and governments. The program encourages viewers to adopt a proactive approach to cybersecurity, emphasizing the importance of education, vigilance, and reporting suspicious activities."Bytes and Crimes: Navigating Online Threats" serves as a comprehensive guide to the digital landscape's dark side. By providing insights into the nature of cyber threats and practical tips for safeguarding digital assets, it empowers individuals and organizations to navigate the digital world with confidence and resilience. In an era where our lives are increasingly lived online, being informed and proactive about cybersecurity is not just advisable-it's imperative.

  • af Reza Montasari
    880,95 - 987,95 kr.

    This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible.As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.

  • af Daniel Brantes Ferreira
    157,95 kr.

    The Book "Law and Digital Technologies: the Way Forward" represents the collection of the papers of the participants of the International Conference "Law and Digital Technologies: The Way Forward", held by AMBRA University (USA), Candido Mendes University (Brazil) and South Ural State University (Russia) 10-11th November 2021. It covers highly-relevant issues in the sphere of the digitalization of law and aimed at defining future steps in regulation of the digital technologies from international and comparative perspective.

  • af Reza Montasari
    1.307,95 kr.

    This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within thecontext of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.To this end, the book:presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.The research contained in the book fits well into thelarger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.

  • af Phillips Tahuer
    132,95 kr.

    Este libro contiene una descrición del flagelo que significa la piratería en la era moderna. El robo a petroleros o a cruceros turísticos, como asi también el robo de información electrónica o la falsificación de marcas reconocidas. Un detallado análisis de las causas y consecuencias en una lectura amena que atrapa y concientiza por el problema global.

  • af Emilio Bravo
    292,95 kr.

  • af American Telephone and Telegraph Comp
    547,95 kr.

  •  
    228,95 kr.

    Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.

  • af Tine (Nottingham Trent University Munk
    473,95 - 1.466,95 kr.

  • af Ayoyemi Lawal-Arowolo
    473,95 kr.

    This book reflects on the development of Nigeria's intellectual property law and outlines the urgent need for reform. Honouring Professor Adebambo Adewopo SAN, the pioneering thinker in Nigerian intellectual property law, this book will be an important resource for researchers working on African Law.

  •  
    228,95 kr.

    Digital Totalitarianism focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity and the collapse of critical thinking with the social media fueled rise of conspiranoia.

  • af Paul A. Watters
    484,95 - 1.321,95 kr.

  • af Ayman El Hajjar
    1.307,95 kr.

    In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Ian Brown
    722,95 kr.

  • af Becky Holmes
    127,95 kr.

    "Her prose radiates empathy, with none of the artificial distance that journalists or academics enforce between themselves and their subjects." — The Washington PostOne woman's hilarious and fascinating quest to expose the truth behind fraudulent Twitter profiles: romance scammers beware, you have met your match!Online romance fraud is a problem across the globe. It causes financial and emotional devastation, yet many people refuse to take it seriously. This is the story of one middle-aged woman in a cardigan determined to understand this growing phenomenon. No other woman has had so many online romances – from Keanu Reeves to Brad Pitt to Prince William – and Becky Holmes is a favourite among peacekeeping soldiers and oil rig workers who desperately need iTunes vouchers. By winding up scammers and investigating the truth behind their profiles, Becky shines a revealing, revolting and hilarious light on a very shady corner of the internet. Featuring first-hand accounts of victims, examples of scripts used by fraudsters, a look into the psychology of fraud and of course plenty of Becky’s hysterical interactions with scammers, this is a must-read for anyone who needs a reminder that Keanu Reeves is NOT in love with them.

  • af Davide Maltoni
    1.107,95 - 1.689,95 kr.

    A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field. Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems. This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.