Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Chiffrement --- Codes secrets --- Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Informatique--Sécurité --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Sécurité informatique --- Écriture cryptographique --- Écriture secrète --- Computer security. --- Cryptography. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Protection --- Security measures --- Theses
Choose an application
Electronic commerce --- -Electronic commerce --- -Information superhighway --- -Internet --- Information superhighway --- -34:681.3 --- Data highway --- Data superhighway --- Digital highway --- Electronic superhighway --- Global information infrastructure --- I-way (Information superhighway) --- Infobahn --- Infopike --- Information highway --- Information infrastructure --- Infrastructure, Information --- National information infrastructure --- Superhighway, Information --- Information networks --- Information society --- Information technology --- Cyberspace --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Law and legislation --- -Law and legislation --- Law and legislation. --- -Congresses --- Internet --- 34:681.3 --- Commercial law
Choose an application
Computer crimes --- Data encryption (Computer science) --- Self-incrimination --- Immunity from self-incrimination --- Nemo-tenetur --- Privilege against self-incrimination --- Right to silence --- Civil procedure --- Confession (Law) --- Confidential communications --- Evidence, Criminal --- Evidence (Law) --- Privileges and immunities --- Procedure (Law) --- Witnesses --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Law and legislation --- Criminal law. Criminal procedure --- Computer architecture. Operating systems
Choose an application
Human rights --- Criminal law. Criminal procedure --- Information systems --- Netherlands
Choose an application
Choose an application
Combating cybercrime requires law-enforcement expertise, manpower, legislation, and policy priorities within the ambit of crime-fighting. Because of the utterly transnational character of cybercrime, countries must focus on international investigation and prosecution. As cultural and legal traditions play a major part in countries' views on the exercise of criminal law and sovereignty, a unified approach to this phenomenon requires serious reflection. This book intends to contribute to a more concerted international effort towards effectively fighting cybercrime by offering an in-depth survey of views and practices in various jurisdictions. It includes chapters on the Council of Europe's Cybercrime Convention and on international co-operation in criminal matters. Thirteen country reports, written by experts in the field, are included in alphabetical order. The book concludes by discussing one of the most urgent steps that needs to be taken: resolving positive jurisdictional conflicts when several jurisdictions seek to prosecute a cybercriminal at the same time.
Criminal law. Criminal procedure --- Computer architecture. Operating systems --- Computer crimes. --- Criminal jurisdiction. --- Computer networks --- Law and legislation --- Criminal provisions. --- Criminalité informatique --- Internet --- Droit pénal international --- Juridiction (droit international) --- Computer crimes --- Criminal jurisdiction --- Jurisdiction (International law) --- Droit --- Dispositions pénales --- Conflict of criminal jurisdiction --- Conflict of laws --- Criminal law --- Criminal procedure --- Exterritorial crime --- Jurisdiction --- International criminal law --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Law and legislation&delete& --- Criminal provisions --- Distributed processing --- Computer networks - Law and legislation - Criminal provisions. --- Cybercriminalité --- Cybercriminalité --- Droit pénal international --- Dispositions pénales
Choose an application
Choose an application
Choose an application
Computer crimes --- Computer networks --- Contracts --- Law and legislation --- Automation
Choose an application
Listing 1 - 10 of 27 | << page >> |
Sort by
|