To see the other types of publications on this topic, follow the link: Cyber border.

Books on the topic 'Cyber border'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 books for your research on the topic 'Cyber border.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Woltag, Johann-Christoph. Cyber warfare: Military cross-border computer network operations under international law. Intersentia, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kawamoto, Kevin. On the borders of change: Digital communications in North America and the emergence of transnational "cyber-polities". Canadian Studies Center, The Henry M. Jackson School of International Studies, University of Washington, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

WOLTAG. Cyber Warfare: Military Cross-Border C. Intersentia Uitgevers N.V., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Morganstein, Stanley. Double Edge Sword: Border Patrol, Navy Seals, and Cyber-terrorists. CreateSpace Independent Publishing Platform, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

(Editor), Anne Martinez-Saiz, and Nuit de Chine (Illustrator), eds. Handbook for Bloggers and Cyber-Dissidents. Reporters Without Borders, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Emerson, Michael, and Denis Cenușa, eds. Deepening EU-Moldovan Relations. 3rd ed. Lexington Books, 2021. https://doi.org/10.5040/9798881810474.

Full text
Abstract:
For Moldova, the signing of the Association Agreement and the DCFTA with the European Union in 2014 was an act of strategic geopolitical significance. Of all the EU’s eastern neighbours, Moldova is objectively the most European on several counts, including sharing a common history, language, culture and border with EU member state Romania. These provide a positive foundation for a successful Agreement, notwithstanding the major political challenges that confront contemporary Moldova. The purpose of this Handbook is to make the complex political, economic and legal content of the Association Ag
APA, Harvard, Vancouver, ISO, and other styles
8

Chinese Industry 4.0: Designing High-Tech Solutions under the Cybersecurity Regime of the People’s Republic of China. SinopeerPress, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dominik, Brodowski. Part III Other Relevant International Regimes and Issues, 16 Transnational Organised Crime and Cybercrime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0016.

Full text
Abstract:
Cybercrime has not only become a new form of organised crime, in which a network of independent perpetrators cooperate on a case-by-case basis without an enduring, hierarchical structure, but is also gaining increasing attention from traditional organised crime groups. With cybercrime easily crossing geographical borders, a closer look at the international law framework on the fight against cybercrime is warranted, including but not limited to the Council of Europe Convention on Cybercrime. This chapter focuses on cyber-related aspects of substantive criminal law, criminal procedure, and juris
APA, Harvard, Vancouver, ISO, and other styles
10

Pierre, Thielbörger. Part IV Transnational Organised Crime as Matter of Certain Branches of International Law, 17 The International Law of the Use of Force and Transnational Organised Crime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0017.

Full text
Abstract:
Cybercrime has not only become a new form of organised crime, in which a network of independent perpetrators cooperate on a case-by-case basis without an enduring, hierarchical structure, but is also gaining increasing attention from traditional organised crime groups. With cybercrime easily crossing geographical borders, a closer look at the international law framework on the fight against cybercrime is warranted, including but not limited to the Council of Europe Convention on Cybercrime. This chapter focuses on cyber-related aspects of substantive criminal law, criminal procedure, and juris
APA, Harvard, Vancouver, ISO, and other styles
11

Leiser, Mark, and Andrew Murray. The Role of Non-State Actors and Institutions in the Governance of New and Emerging Digital Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.28.

Full text
Abstract:
New digital technologies pose particular problems for regulators. The utility of these technologies is maximized by linking them to the Internet. But Internet technology does not respect national borders, thereby undermining the traditional legitimacy of the Westphalian state to regulate activity within its jurisdictional borders. This has led to the development of competing cyber-regulatory models that attempt to bridge the gap between traditional Westphalian governance and the new reality of the global digital space. Many of these, although not all, fit within post-Westphalian literature. So
APA, Harvard, Vancouver, ISO, and other styles
12

Lau, Dorothy Wai Sim. Chinese Stardom in Participatory Cyberculture. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474430333.001.0001.

Full text
Abstract:
As Chinese performers have become more visible on global screens, their professional images – once the preserve of studios and agents – have been increasingly relayed and reworked by film fans. Web technology has made searching, poaching, editing, positing, and sharing texts significantly easier. Moreover, by using a variety of seamless and innovative methods, a new mode of personality construction has been developed. With case studies of high-profile stars like Jackie Chan, Jet Li, Donnie Yen, and Michelle Yeoh, this ground-breading book examines transnational Chinese stardom as a Web-based p
APA, Harvard, Vancouver, ISO, and other styles
13

Logan, Keith Gregory, ed. Homeland Security and Intelligence. 2nd ed. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798400666162.

Full text
Abstract:
Now updated and expanded for its second edition, this book investigates the role intelligence plays in maintaining homeland security and emphasizes that effective intelligence collection and analysis are central to reliable homeland security. The first edition of Homeland Security and Intelligence was the go-to text for a comprehensive and clear introduction to U.S intelligence and homeland security issues, covering all major aspects including analysis, military intelligence, terrorism, emergency response, oversight, and domestic intelligence. This fully revised and updated edition adds eight
APA, Harvard, Vancouver, ISO, and other styles
14

Martin, Jean Christophe. Theatre of Operations. Edited by Marc Weller. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780199673049.003.0035.

Full text
Abstract:
This chapter explores ‘theatre of operations’ as a legal concept in international law, with emphasis on the geographical extent—‘boundaries of the battlefield’—of the use of force by belligerents. It addresses the meaning of ‘theatre of operations’ by considering two legal issues: the right of parties to an armed conflict to conduct military operations and the applicable law to armed operations carried out beyond the borders of a state. It examines the notion of the area of war in the context of jus in bello, jus ad bellum, and actions taken by the UN Security Council in response to armed conf
APA, Harvard, Vancouver, ISO, and other styles
15

Henken, Ted A., Miriam Celaya, and Dimas Castellanos, eds. Cuba. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798400634741.

Full text
Abstract:
Written by some of the best-known independent scholars, citizen journalists, cyber-activists, and bloggers living in Cuba today, this book presents a critical, complete, and unbiased overview of contemporary Cuba. In this era of ever-increasing globalization and communication across national borders, Cuba remains an isolated island oddly out of step with the rest of the world. And yet, Cuba is beginning to evolve via the important if still insufficient changes instituted by Raul Castro, who became president in 2008. This book supplies a uniquely independent, accurate, and critical perspective
APA, Harvard, Vancouver, ISO, and other styles
16

Powers, Shawn M., and Michael Jablonski. Internet Freedom in a Surveillance Society. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0008.

Full text
Abstract:
This chapter examines the significance of the United States' globally robust surveillance apparatus, led by the National Security Agency (NSA), with particular emphasis on the tension between the internet-freedom movement and cybersecurity policy. Central to this tension is the question of anonymity, or whether or not it is possible to connect behaviors or material online to a particular person. On the one hand, anonymity is central to freedom online, and for online speech in particular. On the other hand, anonymity enables criminal behavior online, ranging from intellectual property theft to
APA, Harvard, Vancouver, ISO, and other styles
17

DeNardis, Laura. The Internet in Everything. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300233070.001.0001.

Full text
Abstract:
The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things—connecting everything from cars to cardiac monitors to home appliances—there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach ac
APA, Harvard, Vancouver, ISO, and other styles
18

US GOVERNMENT. Computer security: Cyber attacks--war without borders : Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee ... Congress, second session, July 26, 2000. For sale by the Supt. of Docs., U.S. G.P.O. [Congressional Sales Office], 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sambaluk, Nicholas Michael. Weaponizing Cyberspace. Praeger, 2022. http://dx.doi.org/10.5040/9798216034216.

Full text
Abstract:
The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that
APA, Harvard, Vancouver, ISO, and other styles
20

Ott, Valerie. Teen Programs with Punch. Libraries Unlimited, 2006. http://dx.doi.org/10.5040/9798216023814.

Full text
Abstract:
Looking for some fresh program ideas for your teen patrons? Want to change those bored expressions on teen faces to eager smiles? This guide offers a stimulating selection of program ideas that will appeal to teens between the ages of 12 and 18 throughout the year! Recognizing that there is no such thing as a typical teenager, the programs represent a broad range of interests, from arts and crafts workshops to educational programs to purely recreational activities—from serious to serious fun. Programs for all seasons include Goth Gathering, Intolerance Forum, Night at the Oscars, Library Fear
APA, Harvard, Vancouver, ISO, and other styles
21

Shackelford, Scott J. The Internet of Things. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190943813.001.0001.

Full text
Abstract:
The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention pa
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!