Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book includes detailed coverage of intellectual property, contract, encryption and liability issues, including allocation of domain names, use of metatags and other forms of search engine optimization, digital signatures and the position of ISPs and other intermediaries. There are case studies on electronic conveyancing and e-taxation. Though the book is written from a UK perspective, comparative material is included from other jurisdictions, including America and Singapore in particular.
Caroline marries an unemployed actor, Kevin, whom she supports while he flirts with women and spoils her flat with his oafish behaviour. Eventually he seduces one of her pupils and Caroline throws him out. Miserably isolated, she goes to dinner with Jilly and Ivor and meets Matthew who appears eminently suitable. But their ensuing affair is doomed by Matthew's persistent, precision fault-finding and Caroline realizes she can cope better with the slovenly, but kind-hearted, Kevin sprawling on her sofa. The plot is evolved in clever time-splitting sequences between the present and three years past.3 women, 4 men, 8 women or men
Traces the transformation of intelligence from a tool for law enforcement to a means of avoiding the law - both national and international. This book argues that the bureaucracy and narrow political goals surrounding intelligence actually have the potential to increase the terrorist threat.
This volume explains the impact of the war on terrorism on the world's secret services and intelligence agencies and describes how ultra-modern new technologies have vastly increased their power to spy and eavesdrop.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.