Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Bedankt voor het vertrouwen het afgelopen jaar! Om jou te bedanken bieden we GRATIS verzending (in België) aan op alles gedurende de hele maand januari.
Afhalen na 1 uur in een winkel met voorraad
In januari gratis thuislevering in België
Ruim aanbod met 7 miljoen producten
Bedankt voor het vertrouwen het afgelopen jaar! Om jou te bedanken bieden we GRATIS verzending (in België) aan op alles gedurende de hele maand januari.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book deals with questions of democracy and governance relating to new technologies. The deployment and application of new technologies is often a...Lees meer
The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, a...Lees meer
Topical issue as Google is used by millions of people every day Analyzes whether accusations against Google are well-founded Explores if existing lega...Lees meer
New technologies affect the legal system, but do they and should they also affect constitutional rights? These are questions that every country has to...Lees meer
This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data...Lees meer
In this book, the protection of personal data is compared for eight EU member states, namely France, Germany, the United Kingdom, Ireland, Romania, It...Lees meer
Topical issue as Google is used by millions of people every day Analyzes whether accusations against Google are well-founded Explores if existing lega...Lees meer
This book presents an evaluation of recent legislative initiatives against unsolicited commercial e-mail (spam) in the European Union. The authors pro...Lees meer
Chapter 1 INTRODUCTION 1. 1 Research Objective 1 The modern State is unlikely to be the end configuration of organized political life. Throughout hist...Lees meer
Given the popularity of drones and the fact that they are easy and cheap to buy, it is generally expected that the ubiquity of drones will significant...Lees meer
INTRODUCTION George Bernard Shaw wrote - 'when a stupid man is doing something he is ashamed 1 of, he always declares that it is his duty. ' Years ear...Lees meer
The collected essays in this book concern the intriguing matter of the interaction between law and technology and the normative role of information te...Lees meer
'Is private regulation of the Internet over? Have states taken over?' This book examines the function of self-regulation in cyberspace. It argues that...Lees meer
How does the 'on-line' world relate to the 'off-line' world? Is it different, separate, or even unique compared to the off-line world, or just a part ...Lees meer
Fighting the War on File Sharing aims at a multi-faceted understanding of why peer-to-peer services currently fail to gain their full potential in our...Lees meer
Interdisciplinary approach of the topic of identity theft Gives an insight how identity theft occurs and how perpetrators of the crime manage to take ...Lees meer
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children's rights organization Terre des Hommes in 2013 in resp...Lees meer
Customary Law of the Internet is the first book that deals comprehensively with the emergence of a new kind of law on the Internet that could be utili...Lees meer
Virtual Arguments ' subject matter is argument assistance software. Whereas word-processing software assists in the writing and formatting of texts, a...Lees meer
The book in front of you is the first international academic volume on the legal, philosophical and economic aspects of the rise of 3D printing. In re...Lees meer
Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microc...Lees meer
Cybercrime is remarkably varied and widespread, and financial losses range from a few hundred dollars being extorted to multi-million dollar cyberfrau...Lees meer
Worldwide, governments and businesses are recognizing the value of open source and free software. This software is developed and continuously improved...Lees meer
Debates rage about how, by whom, and to what extent cyberspace anonymity should be controlled. This volume aims to provide an insight into and an unde...Lees meer