Books on the topic 'Cyber border'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 21 books for your research on the topic 'Cyber border.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Woltag, Johann-Christoph. Cyber warfare: Military cross-border computer network operations under international law. Intersentia, 2014.
Find full textKawamoto, Kevin. On the borders of change: Digital communications in North America and the emergence of transnational "cyber-polities". Canadian Studies Center, The Henry M. Jackson School of International Studies, University of Washington, 1998.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. U.S. G.P.O., 2001.
Find full textMorganstein, Stanley. Double Edge Sword: Border Patrol, Navy Seals, and Cyber-terrorists. CreateSpace Independent Publishing Platform, 2015.
Find full text(Editor), Anne Martinez-Saiz, and Nuit de Chine (Illustrator), eds. Handbook for Bloggers and Cyber-Dissidents. Reporters Without Borders, 2006.
Find full textEmerson, Michael, and Denis Cenușa, eds. Deepening EU-Moldovan Relations. 3rd ed. Lexington Books, 2021. https://doi.org/10.5040/9798881810474.
Full textChinese Industry 4.0: Designing High-Tech Solutions under the Cybersecurity Regime of the People’s Republic of China. SinopeerPress, 2021.
Find full textDominik, Brodowski. Part III Other Relevant International Regimes and Issues, 16 Transnational Organised Crime and Cybercrime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0016.
Full textPierre, Thielbörger. Part IV Transnational Organised Crime as Matter of Certain Branches of International Law, 17 The International Law of the Use of Force and Transnational Organised Crime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0017.
Full textLeiser, Mark, and Andrew Murray. The Role of Non-State Actors and Institutions in the Governance of New and Emerging Digital Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.28.
Full textLau, Dorothy Wai Sim. Chinese Stardom in Participatory Cyberculture. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474430333.001.0001.
Full textLogan, Keith Gregory, ed. Homeland Security and Intelligence. 2nd ed. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798400666162.
Full textMartin, Jean Christophe. Theatre of Operations. Edited by Marc Weller. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780199673049.003.0035.
Full textHenken, Ted A., Miriam Celaya, and Dimas Castellanos, eds. Cuba. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798400634741.
Full textPowers, Shawn M., and Michael Jablonski. Internet Freedom in a Surveillance Society. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0008.
Full textDeNardis, Laura. The Internet in Everything. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300233070.001.0001.
Full textUS GOVERNMENT. Computer security: Cyber attacks--war without borders : Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee ... Congress, second session, July 26, 2000. For sale by the Supt. of Docs., U.S. G.P.O. [Congressional Sales Office], 2001.
Find full textSambaluk, Nicholas Michael. Weaponizing Cyberspace. Praeger, 2022. http://dx.doi.org/10.5040/9798216034216.
Full textOtt, Valerie. Teen Programs with Punch. Libraries Unlimited, 2006. http://dx.doi.org/10.5040/9798216023814.
Full textShackelford, Scott J. The Internet of Things. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190943813.001.0001.
Full text