Free Delivery Over $100
2357 books were found.
Read More >>
"""A casebook for elective law school courses that examine in depth the relationship between the law and the distribution... Read More >>
From videos of rights violations, to satellite images of environmental degradation, to eyewitness accounts disseminated... Read More >>
Providing an explanation of Internet law and regulation, this title addresses key areas of contention, such as copyright,... Read More >>
"Islamic State’s Online Activity and Responses provides a unique examination of Islamic State’s online activity... Read More >>
Written by the specialist Information Law team at well-known Education Law advisors Forbes Solicitors, this book... Read More >>
This book provides a comparative study of online dispute resolution (ODR) systems and a model of best practice,... Read More >>
This book investigates terrorist activity online and the increasing use of social media to disseminate the ideologies... Read More >>
How to observe, analyze, and read everyone around you without having a single conversation. You don't have to be... Read More >>
This book identifies and explains the different national approaches to data protection – the legal regulation of... Read More >>
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works,... Read More >>
Track Action Items, Meeting Project Notes, with Checklists and Timing Record Your Wins and Accomplishments Great... Read More >>
life is very simple but social media has made is complicated notebook Read More >>
Unter Zugrundelegung eigener Definitionen wird die Beweisführung digitaler Daten anhand der Rechtsordnungen analysiert.... Read More >>
How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient... Read More >>
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for... Read More >>
Have you ever wished you could reprogram your brain, just as a hacker would a computer and learn things quicker... Read More >>
This book highlights that there are three key instances in which the capacity of a human mind intersects with the... Read More >>