1
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ... -- Denial of service attacks -- Malware -- Techniques used by hackers -- Industrial espionage in cyberspace...

2
by González Hauck, Sué
Published 2024
Taylor & Francis
... such as international law in cyberspace, international migration law, and the international climate regime. The book...