Listing 1 - 6 of 6 |
Sort by
|
Choose an application
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket.
Choose an application
Wiretapping --- Data encryption (Computer science) --- Privacy, Right of --- Law and legislation --- #SBIB:309H1015 --- Media: politieke, juridische, ethische, ideologische aspecten (incl. privacy) --- Wiretapping - United States --- Data encryption (Computer science) - Law and legislation - United States --- Privacy, Right of - United States
Choose an application
Contracts --- Data encryption (Computer science) --- Digital signatures --- Signatures, Digital --- Authentication --- Electronic signatures --- Signature (Law) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Agreements --- Contract law --- Contractual limitations --- Limitations, Contractual --- Commercial law --- Legal instruments --- Obligations (Law) --- Juristic acts --- Liberty of contract --- Third parties (Law) --- Automation --- Law and legislation --- Digital signatures - Law and legislation - Great Britain --- Contracts - Great Britain - Automation --- Data encryption (Computer science) - Law and legislation - Great Britain --- Digital signatures - Law and legislation --- Contracts - Automation --- Data encryption (Computer science) - Law and legislation
Choose an application
Data encryption (Computer science) --- Data protection --- Electronic commerce --- Law and legislation --- Security measures --- Cryptography --- Cryptographie --- Data encryption (Computer science) - Law and legislation - France --- Data protection - Law and legislation - France --- Electronic commerce - Security measures - France --- COMMERCE ELECTRONIQUE --- SIGNATURE ELECTRONIQUE --- DROIT DE LA PREUVE --- DONNEES A CARACTERE PERSONNEL --- CONVENTIONS SECRETES
Choose an application
"The growth of blockchain technology presents a number of legal questions for lawyers, regulators and industry participants alike. This book identifies the legal challenges posed by cryptocurrencies, smart contracts and other applications of blockchain, questioning whether these challenges can be addressed within the current legal system, or whether significant changes are required. Chapters assess how blockchain's many applications will affect different areas of law, including contract, criminal, financial and private international law. Contributors analyse how these fields of law may need to adapt to accommodate Blockchain technology, proposing possible solutions and ways forward. Several chapters are based on the Swiss legal framework as it allows market participants the widest freedom to operate in Blockchains and cryptocurrencies. Overall, this...work highlights the importance of creating a regulatory structure that will allow Blockchain technologies to develop, whilst also ensuring they are not abused. The conclusions of this book are however quite reassuring, with contributing authors suggesting that although disruptive, the challenges brought about by the 'blockchain revolution' can, for the most part, be effectively addressed within the law as we know it."
Blockchains (Databases) --- Data encryption (Computer science) --- Electronic funds transfers --- Cryptocurrencies --- Law and legislation --- Commercial law --- Banking law --- Blockchains --- Chiffrement (informatique) --- Monnaie électronique --- Cryptomonnaie --- Marché financier --- Law and legislation. --- Droit. --- Droit --- Blockchains (Databases) - Law and legislation --- Data encryption (Computer science) - Law and legislation --- Electronic funds transfers - Law and legislation --- Cryptocurrencies - Law and legislation --- Monnaie électronique --- Marché financier
Choose an application
cryptografie --- strafrecht --- Law --- privacy --- internet --- Cryptologie --- Data encryption (Computer science) --- Law and legislation --- 343.2 --- Data encryption (Compter science) --- -681.3*D46 --- 681.3*D46 --- Algemeen strafrecht --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 343.2 Algemeen strafrecht --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data encryption (Computer science) - Law and legislation - Belgium
Listing 1 - 6 of 6 |
Sort by
|