Vi bøger
Levering: 1 - 2 hverdage

Lovgivning om IT og kommunikation

Her finder du spændende bøger om Lovgivning om IT og kommunikation. Nedenfor er et flot udvalg af over 159 bøger om emnet. Det er også her du finder emner som Postlovgivning.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af R. D. Kelly
    172,95 kr.

  • af Pia Stoffels
    547,95 kr.

    Moderne Kraftfahrzeuge fahren heute schon in weiten Teilen automatisiert und vernetzt auf deutschen Straßen. Dabei sammeln und verarbeiten sie immer mehr personenbezogene Daten. Im Mittelpunkt dieser Arbeit steht die Frage, ob und wie die datenschutzrechtlichen Anforderungen der Europäischen Datenschutzgrundverordnung mit ihrem technologieneutralen Ansatz sinnvoll auf die in vernetzten und automatisierten Kfz stattfindenden Datenverarbeitungen angewendet werden können. Der Fokus wurde hierbei auf die Daten solcher Personen gelegt, die nicht mit den datenschutzrechtlich Verantwortlichen in einem direkten Näheverhältnis stehen, sog. Drittbetroffene.

  • af Carina Thull
    526,95 kr.

    Cyberrisiken sind für Unternehmen weltweit das größte Geschäftsrisiko. Die zunehmende Wahrscheinlichkeit, von einem Cyberangriff betroffen zu werden, wirft die Frage der Absicherung potentieller Schäden durch Versicherungen auf. Vor diesem Hintergrund untersucht die Autorin anhand der Musterbedingungen des Gesamtverbandes der deutschen Versicherungswirtschaft zur Cyber-Risikoversicherung (AVB Cyber), inwieweit Cyberrisiken angemessen abgesichert werden können. Daneben widmet sie sich der Absicherung durch traditionelle Sach- und Haftpflichtversicherungen. Ein wichtiger Aspekt betrifft die Problematik um ¿silent cyber". Unter diesem Stichwort wird die Absicherung von Cyberrisiken durch konventionelle Versicherungen zusammengefasst, die diese Risiken weder ausdrücklich ein- noch ausschließen.

  • af Paul A. Watters
    487,95 kr.

    This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.

  • af C. P. Kumar
    132,95 kr.

    "Empower Yourself Against Cyber Crimes and Frauds" is a comprehensive guide that equips readers with the knowledge and strategies needed to navigate the treacherous world of cyber threats. With an in-depth exploration of various topics, including phishing, identity theft, social engineering, online scams, malware attacks, ransomware, data breaches, financial frauds, cyberstalking, cyberbullying, the dark web, cybersecurity best practices, the legal framework, and future trends, this book offers valuable insights into the modern cyber threat landscape. Packed with practical advice and defense mechanisms, this book is an indispensable resource for individuals looking to protect themselves and their digital lives from the ever-evolving dangers of cyber crimes and frauds.

  • af Russell G. Smith
    1.268,95 kr.

    This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019. Information and communications technologies played a pivotal role during the pandemic in communicating information across the globe on the risks and responses to the pandemic but also in providing opportunities for various forms of illegality. This volume describes the nature and extent of such illegality, its connection to the pandemic and how digital technologies can assist in solving not only the health crisis but also the associated crime problems. The contributors are established academic scholars and policy practitioners in the fields of cybercrime and computer forensics. This book provides a ready source of content including technological solutions to cybercrime, legal and legislative responses, crime prevention initiatives and policy discussions dealing with the most critical issues present during and following the pandemic.

  • af Paul (Northwestern University Gowder
    326,95 - 975,95 kr.

  • af Stanley Osezua Ehiane
    1.179,95 kr.

    The advent of the Internet for global advancement and development has opened the world to new crimes. This is the first comprehensive book on the subject matter, considering the absence of textbooks in teaching the subject matter in higher learning institutions. Hitherto, the book is distinctive and timely in the wake of the inclusion of the subject matter as a new curriculum in many African universities. The book focuses on South Africa, where the Internet has been misused by individuals to perpetuated crime which has been on the increase and unabated. The book's contents and its discourse are significant to students in higher institutions, researchers, and organizations, to give in-depth insights into varied cybercrime on various forms and the manners in which cybercrimes have been executed. Lastly, the book contains instances where the Internet has been used to perpetuate crimes in recent times in South Africa.

  • af Elisa Bertino
    401,95 kr.

    This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.

  • af Precious L Williams
    172,95 kr.

    Stress and heartbreak didn't keep you from making it through law school and passing the state bar. Take a moment, breathe, and celebrate yourself for crossing the finish line and not giving up! You done? Good...because now it's time to get to work! It's time to become an attorney that makes it rain! In Rainmaking 101 From Day 1, author and former attorney, Precious L. Williams, walks you step-by-step through taking your career in law from a dream to reality. But not the reality you think. Showing up early and leaving late just to impress your partners and superiors isn't the #truetea you want! Worker bees buzz, but not YOU. You're a Rainmaker, after all - one of the real power players who can learn how to play chess by building the firm's clientele, pushing the company as a leading problem solver, and onboarding a consistent stream of referrals to bring in more revenue. It's time to learn the skills that will make it nearly impossible to get rid of you, King or Queen Bee! You're an asset to the firm...and assets don't play checkers! If you're ready for Precious to drop the invaluable knowledge they didn't want you to learn in law school. I know you're tired of keeping your head down to stay off the chopping block in the next round of layoffs. If you want a fail-safe plan to keep them from getting rid of you - become a Rainmaker From Day 1! Learn strategy, relationship-building on steroids, and how to turn your name into money with fire advice on every page! Worker bees are easily exchangeable, but a Rainmaker is NOT! Be the Rainmaker! Are you ready? Let's GO!

  • af Pekka Neittaanmäki & Martti Lehto
    1.428,95 kr.

  • af Al-Sakib Khan Pathan, Kutub Thakur & Sadia Ismat
    877,95 kr.

    This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity.This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses like Computer Networks and Security, Information Security, etc.

  • af Juliana Zuluaga Madrid
    1.587,95 kr.

    Current advancements in civil rights and environmental activism emphasize the crucial importance of making environmental information widely available to the public, regardless of whether it is in the hands of the government or of corporations.

  • af Andrew Roberts
    1.648,95 kr.

    This collection considers the implications for privacy of the utilisation of new technologies in the criminal process. The threat that technology poses to privacy interests demands critical re-evaluation of current law, policy, and practice. This is provided by the contributions to this volume.

  • af United Kingdom Law and S. . . Association
    187,95 kr.

    Legal Issues Journal (LIJ) publishes original research on all legal matters affecting justice, equality and other pressing issues for societies. The journal welcomes interdisciplinary work at the intersection of law and other disciplines, such as genetics, biosciences, philosophy, linguistics, neuroscience, medicine, and business. The Journal publishes original papers, case comments, short reports, debates and book reviews. The Journal also provides important news and interpretation on changes in the legal world and coming trends affecting law, lawyers, and society. Contribution to society, nationally and internationally, is the focus of LIJ. LIJ uses double-blind peer review process where both the reviewer(s) and the author(s) are anonymous. IN THIS ISSUE:The Liability Limits of Self-Driving Cars by Liliya Ivanova, Nikita KalashnikovUniversality and Particularity: Why Universalism Should be the Standard for Human Rights by Olalekan Moyosore Lalude, Nsongurua UdombanaManagement of Protected Areas in Albania Toward European Standards by Dr. Stela Meçaj, Dr. Jonida MehmetajFit for Purpose? A Critique of the Jury System within the English and Welsh Jurisdiction by Tony Singh PurewalDesigning Post-Genomic Future Together by Robert Chapman, Yulia Kovas, Fatos Selita Jurisdictional and Technical Challenges of Next Generation Cyber Events by Peter Stephenson

  • af Ahmed A. Abd El-Latif
    2.582,95 kr.

    This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10¿11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. CCSET 2022 was devoted to advances in cybersecurity, cybercime, and smart emerging technologies. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 89 paper submissions from 25 countries. Each submission was reviewed by at least three chairs or PC members and 26 regular papers (30%) were accepted. Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements.

  • af Yolanda López Benítez
    157,95 kr.

    - Conocer las causas y efectos en la salud ocupacional provocados por el impacto de la conectividad en el uso de las tecnologías en el ámbito laboral.- Profundizar en la base jurídica sobre la que se sustenta la libertad individual del trabajador al acogerse al derecho a la desconexión digital como herramienta legislativa, asegurando con ello el respeto al descanso fuera de los tiempos de trabajo.

  • af Ian Mitchell, Reza Montasari, Fiona Carroll, mfl.
    1.648,95 kr.

  • af Axel Boursier, Annabelle Seoane & Angeliki Monnier
    1.207,95 kr.

  • af Dieter Stein & Victoria Guillén-Nieto
    1.538,95 kr.

  • af Matthew McGhee
    1.257,95 kr.

    Cyber fraud is a well-established and significant concern for business and individuals. The problem has developed exponentially, in terms of scale, coverage and value, in recent years. In part, this has been the result of recent events, such as the Covid-19 pandemic making remote working the norm and the widespread use of cryptocurrencies, providing increased opportunity for fraud. In addition to the obvious financial consequences, incidents of cyber fraud cause reputational harm and embarrassment to the victims, as well as engaging regulatory obligations for some persons.However, well-established principles of law and procedure can be adapted to meet the new challenges posed by cyber fraud. The Court has shown willingness to develop its jurisdiction to give the victims of cyber fraud the tools needed to trace, identify, seize and recover the proceeds of frauds perpetrated against them.This book is a practical handbook to assist the reader in navigating the peculiarities of claims in respect of cyber fraud. It acts as a guide on the procedure and substantive law relating to this burgeoning practice area, assisting the practitioner who is dealing with cyber fraud litigation - often under strict time pressures. Significant updates since the previous edition include dealing with crypto-assets in their own chapter, analysing recent trends in banks' liability for cyber fraud, and considering in greater depth the use of disclosure orders to identify anonymous cyber fraudsters and the proceeds of their wrongdoing.ABOUT THE AUTHORMatthew McGhee is a barrister at Twenty Essex with a broad commercial practice and a significant focus on civil fraud claims. He has been at the forefront of cyber fraud litigation, having acted for victims of cyber fraud and having both brought and defended fraud claims levelled against financial institutions. Matthew also has practical experience in cryptocurrency litigation.Notable instructions have included CMOC v Persons Unknown [2018] EWHC 2230 (Comm) (a claim to trace and recover money stolen by cyber fraudsters, and the first-known occasion that a worldwide freezing injunction has been granted against 'persons unknown') and IFT v Barclays [2020] EWHC 3125 (Comm) (concerning a claim against the bank which received the proceeds of fraud, raising issues of when banks may be held liable for their customers' frauds).Matthew is regularly invited to speak at national and international industry conferences and events about cyber law and litigation.CONTENTSIntroductionChapter One - Commencing Proceedings Against Anonymous FraudstersChapter Two - Fraudulent Payments: Recovery From WrongdoersChapter Three - Fraudulent Payments: Recovery From 'Innocent' PartiesChapter Four - ExtortionChapter Five - Other Wrongful AcquisitionsChapter Six - Crypto-AssetsChapter Seven - Procedural GuidanceChapter Eight - Coda on Future Developments

  • af Karina G. Sanchez
    192,95 kr.

    The new female manager's encyclopedia -- how to lead like a pro and spin teamwork into value, even with little experienceCongratulations! You're now a manager! These words are music to my ears, but they can send a chill down the spine of new millennial managers.How will you get everyone to respect and trust your decisions?Is it possible to lead a team with much older and more experienced peers than you are?Can you be assertive and draw the line between being friends with your team members and leading them as you should?Between these concerns and battling imposter syndrome as a young career manager, millennials are often left feeling like they have been thrown into the fire pit.With millennials outnumbering other generations at work and many older workers turning to retirement, it's no wonder why there are so many young managers in the workplace today.And if you've been newly appointed to a managerial position with a few years of experience under your belt… you may struggle to get used to your peers calling you "boss."You may also feel like you lack enough experience to manage the organization and the employees while meeting expectations.However, it would help if you weren't afraid to embrace leadership roles.You earned every right to excel, and your boss must have noticed something exceptional in you, so don't downplay yourself.You are not inadequate.And yes, you are the perfect choice for this position.All you need is to figure out how to lead your team -- and you will be beating the quarterly targets before you know it.In the New Manager's Guide, you'll discover:How to overcome imposter syndrome and feel comfortable leading people, even if you don't have as much experience as everyone else.How to evaluate your natural strengths, talents, and attributes, then use them to boost your influence in the workplace.A deep understanding of the human side of leadership that you won't find anywhere else to help you grow your leadership skills.How to draw information out of people in a gentle, authentic way and use the feedback to progress within your organization.A coaching and mentorship guide to help you interact more with your team members and reduce employee turnover.How to keep your emotions in check and prevent them from clouding your leadership decisions.How to manage conflicts and help your team members collaborate like pros.How to present like you were born standing in front of a podium, using the right words when addressing your peers.How to use your leadership powers to gain credibility in the workplace and develop a character of a leader.How to lead a team with older, more experienced members and get them to respect and consult you before making any decisions.And much more… Leading a team in your early career years is an excellent opportunity to excel significantly in your field.If you feel inadequate for the role, there's no better way to fix it than to learn as much as you can about leadership now. Written with millennials in mind, this guide contains all the tools, hacks, advice, templates, and questions to give you the confidence and knowledge boost you've been looking for.

  • af Alexa Koenig & Andrea Lampros
    217,95 - 791,95 kr.

  • af Richard Susskind
    197,95 kr.

  • af Marwan Omar
    417,95 kr.

    This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks.This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program's behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well.This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques.The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.

  • af Yassine Maleh
    381,95 kr.

    This SpringerBrief  contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and developing information confrontation in the international community. However, it cannot promise to provide an in-depth examination. The issue of cybersecurity is simply too wide-ranging for our purposes. This acknowledgment is meant to encourage more detailed research into the broader topics covered in this brief to better inform current approaches to national cybersecurity performance evaluation.This SpringerBrief targets researchers interested in exploring and understanding Morocco and its efforts in implementing its national cybersecurity strategy. This brief is also a relevant reference for diplomats, executives, CISOs, cybersecurity professionals and engineers working in this related field.

  • af Diana Dimitrova
    585,95 kr.

    This book offers conceptual analyses, highlights issues, proposes solutions, and discusses practices regarding privacy and data protection in transitional times. It is one of the results of the 15th annual International Conference on Computers, Privacy and Data Protection (CPDP), which was held in Brussels in May 2022.We are in a time of transition. Artificial Intelligence is making significant breakthroughs in how humans use data and information, and is changing our lives in virtually all aspects. The pandemic has pushed society to adopt changes in how, when, why, and the media through which, we interact. A new generation of European digital regulations - such as the AI Act, Digital Services Act, Digital Markets Act, Data Governance Act, and Data Act - is on the horizon. This raises difficult questions as to which rights we should have, the degree to which these rights should be balanced against other poignant social interests, and how these rights should be enforced in light of the fluidity and uncertainty of circumstances.The book covers a range of topics, including: data protection risks in European retail banks; data protection, privacy legislation, and litigation in China; synthetic data generation as a privacy-preserving technique for the training of machine learning models; effectiveness of privacy consent dialogues; legal analysis of the role of individuals in data protection law; and the role of data subject rights in the platform economy.This interdisciplinary book has been written at a time when the scale and impact of data processing on society - on individuals as well as on social systems - is becoming ever more important. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.