The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.
For further information see https://www.wildy.com/ebook-formats
Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.
All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.
The Legal Regulation of Cyber Attacks adds important updates to the legal framework on cybercrime, particularly cyber attacks. This updated edition of a well-known comprehensive analysis of the criminalization of cyber attacks adds important new guidance to the legal framework on cybercrime, reflecting new legislation, technological developments, and the changing nature of cybercrime. The focus is not only on criminal law aspects but also on other aspects of information law such as data protection, jurisdiction, electronic evidence, enforcement, and digital forensics. It provides a thorough analysis of the legal regulation of attacks against information systems in the context of European, international, and comparative law.
What’s in this book:
Among the new and continuing aspects of cybersecurity covered are the following:
Technical definitions, case law, and analysis of both substantive law and procedural law contribute to a comprehensive understanding of cybercrime regulation and its current evolution in practice.
How this will help you:
Addressing a topic of growing importance in unprecedented detail, this second edition of a much-relied-upon resource will be welcomed by professionals and authorities dealing with cybercrime, including lawyers, judges, academics, security professionals, information technology experts, and law enforcement agencies. The complementary approach in this book enables the reader to understand the phenomenon and the legal challenges of cyber attacks in their entirety.