Computer & Internet Law Ebooks
Trending ebooks
The most talked-about and well-loved Computer & Internet Law titles this month.
EU GDPR – An international guide to compliance Rating: 0 out of 5 stars0 ratingsThe Ultimate Legal Guide for Bloggers & Website Owners Rating: 0 out of 5 stars0 ratingsWebsite Law: The Legal Guide for Website Owners and Bloggers Rating: 5 out of 5 stars5/5Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Rating: 4 out of 5 stars4/5Delete: The Virtue of Forgetting in the Digital Age Rating: 4 out of 5 stars4/5Legal Guide to Social Media: Rights and Risks for Businesses and Entrepreneurs Rating: 2 out of 5 stars2/5Network neutrality: From policy to law to regulation Rating: 0 out of 5 stars0 ratingsThe United States of Anonymous: How the First Amendment Shaped Online Speech Rating: 4 out of 5 stars4/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviour, second edition Rating: 0 out of 5 stars0 ratingsSpeech Police: The Global Struggle to Govern the Internet Rating: 5 out of 5 stars5/5Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: Ethical, social, and security impacts for the present and the future, Second edition Rating: 0 out of 5 stars0 ratingsISO/IEC 27701:2025: An introduction to privacy information management systems Rating: 0 out of 5 stars0 ratingsArtificial Intelligence and Law Rating: 0 out of 5 stars0 ratingsDigital Ethics in the Age of AI: Navigating the ethical frontier today and beyond Rating: 0 out of 5 stars0 ratingsThe Twenty-Six Words That Created the Internet Rating: 4 out of 5 stars4/5The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsIT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition Rating: 5 out of 5 stars5/5Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsManaging AI Risk: A practical approach to responsibly managing AI with ISO 42001 Rating: 0 out of 5 stars0 ratingsNIST CSF 2.0: Your essential introduction to managing cybersecurity risks Rating: 0 out of 5 stars0 ratingsLaw and Digital Technologies - The Way Forward Rating: 0 out of 5 stars0 ratingsI Was Scammed Rating: 5 out of 5 stars5/5Identity Crisis: How Identification is Overused and Misunderstood Rating: 0 out of 5 stars0 ratingsThe Future of Change: How Technology Shapes Social Revolutions Rating: 0 out of 5 stars0 ratingsLegal Guide to Social Media, Second Edition: Rights and Risks for Businesses, Entrepreneurs, and Influencers Rating: 5 out of 5 stars5/5Tyrants on Twitter: Protecting Democracies from Information Warfare Rating: 0 out of 5 stars0 ratingsResilient Thinking: Protecting organisations in the 21st century, Second edition Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR) – An implementation and compliance guide Rating: 0 out of 5 stars0 ratings
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
There’s more to discover in Computer & Internet Law
Escape into new ebooks and new adventures.
The GigaLaw Guide to Internet Law: The One-Stop Legal Resource for Conducting Business Online Rating: 0 out of 5 stars0 ratingsAccess Controlled: The Shaping of Power, Rights, and Rule in Cyberspace Rating: 3 out of 5 stars3/5Artificial Intelligence and Law Rating: 0 out of 5 stars0 ratingsManaging AI Risk: A practical approach to responsibly managing AI with ISO 42001 Rating: 0 out of 5 stars0 ratingsNothing to Hide: The False Tradeoff between Privacy and Security Rating: 4 out of 5 stars4/5Law, Privacy and Surveillance in Canada in the Post-Snowden Era Rating: 0 out of 5 stars0 ratingsThe Future of Change: How Technology Shapes Social Revolutions Rating: 0 out of 5 stars0 ratingsSpies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Rating: 4 out of 5 stars4/5Delete: The Virtue of Forgetting in the Digital Age Rating: 4 out of 5 stars4/5ISO/IEC 27701:2025: An introduction to privacy information management systems Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: Ethical, social, and security impacts for the present and the future, Second edition Rating: 0 out of 5 stars0 ratingsThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviour, second edition Rating: 0 out of 5 stars0 ratingsNIST CSF 2.0: Your essential introduction to managing cybersecurity risks Rating: 0 out of 5 stars0 ratingsCyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsYou'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches Rating: 4 out of 5 stars4/5I Was Scammed Rating: 5 out of 5 stars5/5IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition Rating: 5 out of 5 stars5/5Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsDigital Ethics in the Age of AI: Navigating the ethical frontier today and beyond Rating: 0 out of 5 stars0 ratingsCombatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning Rating: 0 out of 5 stars0 ratingsTyrants on Twitter: Protecting Democracies from Information Warfare Rating: 0 out of 5 stars0 ratingsThe Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Freelancer Legal Survival Guide Rating: 0 out of 5 stars0 ratingsThe United States of Anonymous: How the First Amendment Shaped Online Speech Rating: 4 out of 5 stars4/5Speech Police: The Global Struggle to Govern the Internet Rating: 5 out of 5 stars5/5Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsEU GDPR – An international guide to compliance Rating: 0 out of 5 stars0 ratingsCryptocurrency and mining: regulation in the Russian Federation Rating: 0 out of 5 stars0 ratingsThe Art of Cyber Security: A practical guide to winning the war on cyber crime Rating: 0 out of 5 stars0 ratingsThe Ultimate Legal Guide for Bloggers & Website Owners Rating: 0 out of 5 stars0 ratingsPeers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates Rating: 3 out of 5 stars3/5Resilient Thinking: Protecting organisations in the 21st century, Second edition Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsLaw and Digital Technologies - The Way Forward Rating: 0 out of 5 stars0 ratingsThe Twenty-Six Words That Created the Internet Rating: 4 out of 5 stars4/5The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR) – An implementation and compliance guide Rating: 0 out of 5 stars0 ratingsA Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsInternet Book Piracy: The Fight to Protect Authors, Publishers, and Our Culture Rating: 1 out of 5 stars1/5Legal Guide to Social Media, Second Edition: Rights and Risks for Businesses, Entrepreneurs, and Influencers Rating: 5 out of 5 stars5/5Life as a Convicted Sex Offender Rating: 0 out of 5 stars0 ratingsReclaiming the Internet: How Big Tech Took Control—and How We Can Take It Back Rating: 0 out of 5 stars0 ratingsNetwork neutrality: From policy to law to regulation Rating: 0 out of 5 stars0 ratingsLegal Guide to Social Media: Rights and Risks for Businesses and Entrepreneurs Rating: 2 out of 5 stars2/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsWe can!: Taking Action against Hate Speech through Counter and Alternative Narratives (revised edition) Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide Rating: 5 out of 5 stars5/5Identity Crisis: How Identification is Overused and Misunderstood Rating: 0 out of 5 stars0 ratingsEuroprivacy™/®: The first European Data Protection Seal Rating: 0 out of 5 stars0 ratingsBasic Business Law: Essential Legal Concepts for Entrepreneurs and Managers Rating: 0 out of 5 stars0 ratingsiOS Programming: Starter Guide: What Every Programmer Needs to Know About iOS Programming Rating: 2 out of 5 stars2/5The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape Rating: 0 out of 5 stars0 ratingsLaw, Norms and Freedoms in Cyberspace / Droit, normes et libertés dans le cybermonde: Liber Amicorum Yves Poullet Rating: 0 out of 5 stars0 ratingsData Independence: Reclaiming Privacy in an Era of Evolving Tech Rating: 0 out of 5 stars0 ratingsBulletproof Your Marketplace: Strategies for Protecting Your Digital Platform Rating: 0 out of 5 stars0 ratingsThe True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsThe Tangled Web We Weave: Inside The Shadow System That Shapes the Internet Rating: 0 out of 5 stars0 ratingsExposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 0 out of 5 stars0 ratingsWebsite Law: The Legal Guide for Website Owners and Bloggers Rating: 5 out of 5 stars5/5Cybersecurity Essentials for Small Businesses: Safeguarding Your Digital Assets Rating: 0 out of 5 stars0 ratingsFreedom of expression and the internet: Updated and revised 2nd edition Rating: 0 out of 5 stars0 ratingsDigital Hostage Rating: 0 out of 5 stars0 ratingsThe Cyber Resilience Handbook: Defend, Prepare, Survive Rating: 0 out of 5 stars0 ratingsRutgers Computer & Technology Law Journal: Volume 41, Number 1 - 2015 Rating: 0 out of 5 stars0 ratingsRadical Reforms Rating: 0 out of 5 stars0 ratingsThe Law of Play: Understanding Legalities in the Gaming Industry Rating: 0 out of 5 stars0 ratingsHuman Rights in the Age of Platforms Rating: 0 out of 5 stars0 ratingsDigital Dictatorship Rating: 0 out of 5 stars0 ratingsStalker Craig Rating: 0 out of 5 stars0 ratingsComparative handbook: robotic technologies law Rating: 0 out of 5 stars0 ratingsInternet Justice, Philosophy of Law for the Virtual World Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsHacker States Rating: 0 out of 5 stars0 ratingsOperacion Bitcoins: Login to Hell Rating: 0 out of 5 stars0 ratingsSECURITY AND PRIVACY IN AN IT WORLD: Managing and Meeting Online Regulatory Compliance in the 21st Century Rating: 5 out of 5 stars5/5Human rights challenges in the digital age: Judicial perspectives Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratings
Read what you want, how you want
Discover millions of audiobooks, ebooks, podcasts, and so much more with a free trial.
From $11.99/month after trial. Cancel anytime.
