图书介绍

Computer crimePDF|Epub|txt|kindle电子书版本下载

Computer crime
  • edited by Indira Carr. 著
  • 出版社: Ashgate
  • ISBN:9780754628354
  • 出版时间:2009
  • 标注页数:576页
  • 文件大小:28MB
  • 文件页数:595页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Computer crimePDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART Ⅰ THE PARAMETERS OF COMPUTER CRIME3

1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime', Columbia Journal of Transnational Law, 43, pp. 705-62.3

2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker', Journal of Internet Law, 2, pp. 12-23.61

3 Lauren L. Sullins (2006), '"Phishing" for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft', Emory International Law Review, 20, pp. 397-433.73

4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges', Gaming Law Review, 11, pp. 648-65.111

PART Ⅱ HARMONIZATION OF COMPUTER CRIME LAWS - THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE COUNCIL OF EUROPE CONVENTION131

5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime', Journal of Transnational Law and Policy, 12, pp. 287-326.131

6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?', John Marshall Journal of Computer and Information Law, 23, pp. 329-61.171

7 D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty', Richmond Journal of Law and Technology, 9, pp. 1-59.205

8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions', John Marshall Review of Intellectual Property Law, 1, pp. 364-82.265

9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime', Temple International and Comparative Law Journal, 16, pp. 477-518.285

10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven', Washington and Lee Law Review, 62, pp. 781-830.327

PART Ⅲ INVESTIGATION, JURISDICTION AND SENTENCING ISSUES379

11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium', Duke Journal of Comparative and International Law, 9, pp. 451-89.379

12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis', American Business Law Journal, 39, pp. 531 -73.419

13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons', Fordham Intellectual Property, Media and Entertainment Law Journal, 14, pp. 1051-92.463

PART Ⅳ CYBER SECURITY507

14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?', Journal of Law, Economics and Policy, 1, pp. 473-95.507

15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help', Journal of Law, Economics and Policy, l,pp. 171-95.531

16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability', Journal of Law, Economics and Policy, 1, pp. 197-214.557

Name Index575

热门推荐