컨텐츠로 이동
Confronting cyberespionage under international law 해당 항목을 미리보기
닫기해당 항목을 미리보기
해당 아이템을 전자로 보기 위한 자원 선택하기

Confronting cyberespionage under international law

저자: Oğuz Kaan Pehlivan
출판사: New York, NY : Routledge, 2019. ©2019
시리즈: Routledge research in international law.
판/형식:   인쇄본 : 영어모든 판과 형식 보기
평가:

기반으로 1 평가 1 리뷰와 함께

주제
다음과 같습니다:

도서관에서 사본 찾기

&AllPage.SpinnerRetrieving; 해당항목을 보유하고 있는 도서관을 찾는 중

상세정보

추가적인 물리적 형식: ebook version :
문서 유형 도서
모든 저자 / 참여자: Oğuz Kaan Pehlivan
ISBN: 9781138476424 1138476420
OCLC 번호: 1031432817
설명: xvi, 129 pages ; 23 cm.
내용: Introduction --
Cyberspace, espionage and cyberespionage --
Legal responses to economic and industrial cyberespionage.
일련 제목: Routledge research in international law.
책임: Oğuz Kaan Pehlivan.

리뷰

사용자-기여 리뷰

WorldCat 사용자 리뷰 (1)

Confronting Cyberespionage Under International Law

by opehlivan (WorldCat 사용자가 게시함 2020-02-12) 매우만족 퍼머링크

We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal...
더 읽기…  더 읽기…

  • 이 리뷰가 당신에게 도움이 되었습니까?
  •   
GoodReads 리뷰 가져오는 중…
DOGObooks 리뷰를 가지고 오는 중…

태그

모든 사용자 태그 (8)

가장 인기있는 태그 보기 태그 리스트 | 태그 구름

요청하신 것을 확인하기

이 항목을 이미 요청하셨을 수도 있습니다. 만약 이 요청을 계속해서 진행하시려면 Ok을 선택하세요.

링크된 데이터


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1031432817<\/a>> # Confronting cyberespionage under international law<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1031432817<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/spionage<\/a>> ; # Spionage<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_crimes<\/a>> ; # Computer crimes<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internet_security_measures<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_networks_security_measures<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/classification\/K5252<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Thing\/cyberespionage<\/a>> ; # cyberespionage;<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_regime<\/a>> ; # International regime<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/espionage<\/a>> ; # Espionage<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/electronic_surveillance<\/a>> ; # Electronic surveillance<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/345.0231\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_law<\/a>> ; # International law<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internationales_recht<\/a>> ; # Internationales Recht<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/cyberspace<\/a>> ; # Cyberspace<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computerkriminalitat<\/a>> ; # Computerkriminalit\u00E4t<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Person\/pehlivan_oguz_kaan<\/a>> ; # O\u011Fuz Kaan Pehlivan<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4974921856<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Series\/routledge_research_in_international_law<\/a>> ; # Routledge research in international law.<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/4974921856#CreativeWork\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Confronting cyberespionage under international law<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1031432817<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781138476424<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB8F4934<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1031432817<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/345.0231\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Person\/pehlivan_oguz_kaan<\/a>> # O\u011Fuz Kaan Pehlivan<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Pehlivan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"O\u011Fuz Kaan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"O\u011Fuz Kaan Pehlivan<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Series\/routledge_research_in_international_law<\/a>> # Routledge research in international law.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1031432817<\/a>> ; # Confronting cyberespionage under international law<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Routledge research in international law.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Routledge research in international law<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Thing\/cyberespionage<\/a>> # cyberespionage;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Thing<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"cyberespionage;<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_crimes<\/a>> # Computer crimes<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computer_networks_security_measures<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/computerkriminalitat<\/a>> # Computerkriminalit\u00E4t<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computerkriminalit\u00E4t<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/cyberspace<\/a>> # Cyberspace<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/electronic_surveillance<\/a>> # Electronic surveillance<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic surveillance<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/espionage<\/a>> # Espionage<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Espionage<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_law<\/a>> # International law<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"International law<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/international_regime<\/a>> # International regime<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"International regime<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internationales_recht<\/a>> # Internationales Recht<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internationales Recht<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/internet_security_measures<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4974921856#Topic\/spionage<\/a>> # Spionage<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Spionage<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/classification\/K5252<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/4974921856#CreativeWork\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"ebook version :<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1031432817<\/a>> ; # Confronting cyberespionage under international law<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781138476424<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1138476420<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781138476424<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n