Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member States, but to do so in an interdisciplinary manner, involving scholars from diverse backgrounds - ranging from legal experts to ICT and engineering professionals. Cybersecurity requirements must be understood in a broader context, encompassing not just conventional aspects, but also emerging topics. This can only be achieved through an interdisciplinary approach. Indeed, cybersecurity should be consistently considered in relation to cybercrime and/or cyber defense, while examining it through the lens of specific domains that are intertwined with various legal fields. Moreover, it is crucial to uphold ethical standards and safeguard fundamental rights, particularly regarding personal data protection. By adopting this comprehensive perspective, the significance of cybersecurity in the exercise of public authority becomes apparent. It also plays an essential role in upholding the fundamental values of both individual Member States and the EU as a whole, such as the rule of law. Moreover, it fosters trust, transparency, and effectiveness in market relations and public administration interactions. In turn, the book draws on the expertise of its authors to provide insights into ICT components and technologies. Understanding these elements holistically is essential to viewing every "cyber" phenomenon from a legal standpoint. In addition to the holistic and interdisciplinary approach it presents, the book offers a captivating exploration of cybersecurity and an engaging read for anyone interested in the field.