Suggested Topics within your search.
Suggested Topics within your search.
International relations
16
Military history
12
Terrorism, armed struggle
9
Warfare & defence
9
Warfare and defence
6
Defence strategy, planning & research
5
Espionage & secret services
5
Cyber security
4
Espionage and secret services
4
History of engineering and technology
4
Military and defence strategy
4
Diplomacy
3
International humanitarian law
3
International institutions
3
Politics & government
3
Public international law
3
Computer security
2
Cybersecurity
2
Gender studies, gender groups
2
Malaysia
2
Media studies
2
Political control & freedoms
2
Technology: general issues
2
Abstracting
1
Academic literature
1
Armed conflict
1
Artificial intelligence
1
BP Islam. Bahaism. Theosophy, etc
1
Biography: general
1
Biography: science, technology and medicine
1
-
61
-
62by Yehezkiel LemuelSubjects: “...internet, cyber, fraud, law...”
Published 2019-11-01
Get full text
Article -
63by Lowery, Edward W.“... the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law...”
Published 2015
Get full text
-
64Cyber stalking victimisation of women: Evaluating the effectiveness of current laws in India from...by Halder DebaratiSubjects: “...cyber stalking...”
Published 2015-01-01
Get full text
Article -
65by Ni Ketut Supasti DharmawanSubjects: “...the Law No. 40 of 2007...”
Published 2015-04-01
Get full text
Article -
66
-
67
-
68by Synnestvedt Jensen, Louise“... being carried out and the establishment of cyber activist groups. How shall the law be interpreted...”
Published 2013
Get full text
Others -
69by Erendor, Mehmet Emin“..., there is no common application of international law in the United Nations Charter regarding cyber threats or attacks...”
Published 2017
Get full text
-
70by Sinopoli, Anthony F.Subjects: “...cyber-attack...”
Published 2012
Get full text
Get full text
Others -
71
-
72
-
73by Naim Baftiu“...European Journal of Economics, Law and Social Sciences...”
Published 2017-01-01
Get full text
Article -
74by Jawad Hussain Awan, Shazad Memon, Sheeraz Memon, Kamran Taj Pathan, Niaz Hussain Arijo“... and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has...”
Published 2018-04-01
Get full text
Article -
75
-
76
-
77by Bambang HartonoSubjects: “...Hackers, Cyber Crime. Pilar law...”
Published 2014-01-01
Get full text
Article -
78
-
79
-
80Published 2018Subjects: “...Cyber Security...”
Open Access: DOAB: description of the publication
Open Access: DOAB, download the publication
eBook