Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Topical issue as Google is used by millions of people every day Analyzes whether accusations against Google are well-founded Explores if existing lega...Lees meer
Chapter 1 INTRODUCTION 1. 1 Research Objective 1 The modern State is unlikely to be the end configuration of organized political life. Throughout hist...Lees meer
INTRODUCTION George Bernard Shaw wrote - 'when a stupid man is doing something he is ashamed 1 of, he always declares that it is his duty. ' Years ear...Lees meer
The collected essays in this book concern the intriguing matter of the interaction between law and technology and the normative role of information te...Lees meer
Ensuring online safety has become a topic on the regulatory agenda in many Western societies. However, regulating for online safety is far from easy, ...Lees meer
How does the 'on-line' world relate to the 'off-line' world? Is it different, separate, or even unique compared to the off-line world, or just a part ...Lees meer
Fighting the War on File Sharing aims at a multi-faceted understanding of why peer-to-peer services currently fail to gain their full potential in our...Lees meer
Interdisciplinary approach of the topic of identity theft Gives an insight how identity theft occurs and how perpetrators of the crime manage to take ...Lees meer
Virtual Arguments ' subject matter is argument assistance software. Whereas word-processing software assists in the writing and formatting of texts, a...Lees meer
Cybercrime is remarkably varied and widespread, and financial losses range from a few hundred dollars being extorted to multi-million dollar cyberfrau...Lees meer
In 1967, Justice John Marshall Harlan introduced the litmus test of 'a reasonable expectation of privacy' in his concurring opinion in the US Supreme ...Lees meer
Worldwide, governments and businesses are recognizing the value of open source and free software. This software is developed and continuously improved...Lees meer
Debates rage about how, by whom, and to what extent cyberspace anonymity should be controlled. This volume aims to provide an insight into and an unde...Lees meer