přejít na obsah
Confronting cyberespionage under international law Náhled dokumentu
ZavřítNáhled dokumentu
Ověřování...

Confronting cyberespionage under international law

Autor Oğuz Kaan Pehlivan
Vydavatel: New York, NY : Routledge, 2019. ©2019
Edice: Routledge research in international law.
Vydání/formát:   Tištěná kniha : EnglishZobrazit všechny vydání a formáty
Hodnocení:

podle 1 hodnocení 1 zobrazit recenzi

Předmětová hesla:
Více podobných

Vyhledat exemplář v knihovně

&AllPage.SpinnerRetrieving; Vyhledávání knihoven, které vlastní tento dokument...

Detaily

Doplňující formát: ebook version :
Typ dokumentu Kniha
Všichni autoři/tvůrci: Oğuz Kaan Pehlivan
ISBN: 9781138476424 1138476420
OCLC číslo: 1031432817
Popis: xvi, 129 pages ; 23 cm.
Obsahy: Introduction --
Cyberspace, espionage and cyberespionage --
Legal responses to economic and industrial cyberespionage.
Název edice: Routledge research in international law.
Odpovědnost: Oğuz Kaan Pehlivan.

Recenze

Recenze vložené uživatelem

Recenze uživatele WorldCat (1)

Confronting Cyberespionage Under International Law

od opehlivan (Publikoval uživatel WorldCat 2020-02-12) Výborné Trvalý odkaz

We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal...
Přečíst více...  Přečíst více...

  • Byla pro vás tato recenze užitečná?
  •   
Nahrávání recenzí GoodReads...
Přebírání recenzí DOGO books...

Štítky

Štítky všech uživatelů (8)

Zobrazit nejoblíbenější štítky jako: seznam štítků | tag cloud

Potvrdit tento požadavek

Tento dokument jste si již vyžádali. Prosím vyberte Ok pokud chcete přesto v žádance pokračovat.

Propojená data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1031432817<\/a>> # Confronting cyberespionage under international law<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1031432817<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/spionage<\/a>> ; # Spionage<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_crimes<\/a>> ; # Computer crimes<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internet_security_measures<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_networks_security_measures<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/classification\/K5252<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Thing\/cyberespionage<\/a>> ; # cyberespionage;<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_regime<\/a>> ; # International regime<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/espionage<\/a>> ; # Espionage<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/electronic_surveillance<\/a>> ; # Electronic surveillance<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/345.0231\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_law<\/a>> ; # International law<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internationales_recht<\/a>> ; # Internationales Recht<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/cyberspace<\/a>> ; # Cyberspace<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computerkriminalitat<\/a>> ; # Computerkriminalit\u00E4t<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Person\/pehlivan_oguz_kaan<\/a>> ; # O\u011Fuz Kaan Pehlivan<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4974921856<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Series\/routledge_research_in_international_law<\/a>> ; # Routledge research in international law.<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/4974921856#CreativeWork\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Confronting cyberespionage under international law<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1031432817<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781138476424<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB8F4934<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1031432817<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/345.0231\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Person\/pehlivan_oguz_kaan<\/a>> # O\u011Fuz Kaan Pehlivan<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Pehlivan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"O\u011Fuz Kaan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"O\u011Fuz Kaan Pehlivan<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Series\/routledge_research_in_international_law<\/a>> # Routledge research in international law.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1031432817<\/a>> ; # Confronting cyberespionage under international law<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Routledge research in international law.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Routledge research in international law<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Thing\/cyberespionage<\/a>> # cyberespionage;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Thing<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"cyberespionage;<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_crimes<\/a>> # Computer crimes<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_networks_security_measures<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computerkriminalitat<\/a>> # Computerkriminalit\u00E4t<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computerkriminalit\u00E4t<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/cyberspace<\/a>> # Cyberspace<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/electronic_surveillance<\/a>> # Electronic surveillance<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic surveillance<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/espionage<\/a>> # Espionage<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Espionage<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_law<\/a>> # International law<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"International law<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_regime<\/a>> # International regime<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"International regime<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internationales_recht<\/a>> # Internationales Recht<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internationales Recht<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internet_security_measures<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/spionage<\/a>> # Spionage<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Spionage<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/classification\/K5252<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/4974921856#CreativeWork\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"ebook version :<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1031432817<\/a>> ; # Confronting cyberespionage under international law<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781138476424<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1138476420<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781138476424<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n