Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia /
Saved in:
Main Author: | Yangyue, Liu (Author) |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Newcastle upon Tyne, England :
Cambridge Scholars Publishing,
2014.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Access denied the practice and policy of global Internet filtering /
Published: (2008)
Published: (2008)
Access contested : security, identity, and resistance in Asian cyberspace /
Published: (2012)
Published: (2012)
Best practices in government information a global perspective /
Published: (2008)
Published: (2008)
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics /
Published: (2012)
Published: (2012)
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
by: Kim, Chae-yŏng, 1968-
Published: (2002)
by: Kim, Chae-yŏng, 1968-
Published: (2002)
The net delusion the dark side of internet freedom /
by: Morozov, Evgeny
Published: (2011)
by: Morozov, Evgeny
Published: (2011)
Identity management for internet of things /
by: Mahalle, Parikshit N., et al.
Published: (2015)
by: Mahalle, Parikshit N., et al.
Published: (2015)
Archival silences : missing, lost and, uncreated archives /
Published: (2021)
Published: (2021)
Role mining in business taming role-based access control administration /
by: Colantonio, Alessandro
Published: (2012)
by: Colantonio, Alessandro
Published: (2012)
Role-based access control
by: Ferraiolo, David
Published: (2003)
by: Ferraiolo, David
Published: (2003)
Role-based access control
by: Ferraiolo, David
Published: (2007)
by: Ferraiolo, David
Published: (2007)
Access Denied : The Practice and Policy of Global Internet Filtering /
Published: (2008)
Published: (2008)
The Social Dynamics of Open Data /
Published: (2018)
Published: (2018)
Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /
Published: (2010)
Published: (2010)
Effect of the HIPAA privacy rule on health research proceedings of a workshop presented to the National Cancer Policy Forum /
Published: (2006)
Published: (2006)
Internet freedom software and illicit activity : supporting human rights without enabling criminals /
by: Romanosky, Sasha
Published: (2015)
by: Romanosky, Sasha
Published: (2015)
Transparency and secrecy a reader linking literature and contemporary debate /
Published: (2010)
Published: (2010)
Relation based access control /
by: Zhang, Rui
Published: (2010)
by: Zhang, Rui
Published: (2010)
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
by: Thangasamy, Indira
Published: (2011)
by: Thangasamy, Indira
Published: (2011)
Networks and states the global politics of internet governance /
by: Mueller, Milton
Published: (2010)
by: Mueller, Milton
Published: (2010)
Institutions guaranteeing access to information : OECD and MENA region /
Published: (2019)
Published: (2019)
Access to information in Africa law, culture and practice /
Published: (2013)
Published: (2013)
Building DMZs for Enterprise networks
Published: (2003)
Published: (2003)
Digital privacy in the marketplace : perspectives on the information exchange /
by: Milne, George R.
Published: (2015)
by: Milne, George R.
Published: (2015)
Beyond cybersecurity : protecting your digital business /
by: Kaplan, James M.
Published: (2015)
by: Kaplan, James M.
Published: (2015)
Government information in Canada : access and stewardship /
Published: (2019)
Published: (2019)
OAuth 2.0 identity and access management patterns /
by: Spasovski, Martin
Published: (2013)
by: Spasovski, Martin
Published: (2013)
Who controls the Internet? illusions of a borderless world /
by: Goldsmith, Jack L.
Published: (2006)
by: Goldsmith, Jack L.
Published: (2006)
Deployment guide series IBM Tivoli Security Compliance Manager /
by: Bücker, Axel
Published: (2005)
by: Bücker, Axel
Published: (2005)
Security assessment case studies for implementing the NSA lAM /
by: Rogers, Russ
Published: (2004)
by: Rogers, Russ
Published: (2004)
Recent advances in providing QoS and reliability in the future Internet backbone
Published: (2011)
Published: (2011)
Freedom of Information Act.
by: Singleton, Susan
Published: (2008)
by: Singleton, Susan
Published: (2008)
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Published: (2012)
Published: (2012)
Internet policies and issues
Published: (2011)
Published: (2011)
Measurement and reduction of administrative burdens in Greece : an overview of 13 sectors /
Published: (2014)
Published: (2014)
The devil's long tail : religious and other radicals in the internet marketplace /
by: Stevens, David (Lecturer in political theory), et al.
Published: (2015)
by: Stevens, David (Lecturer in political theory), et al.
Published: (2015)
Medical eligibility criteria for contraceptive use
Published: (2009)
Published: (2009)
Perfect passwords selection, protection, authentication /
by: Burnett, Mark
Published: (2006)
by: Burnett, Mark
Published: (2006)
Instant Metasploit starter
by: Ranganath, Karthik
Published: (2013)
by: Ranganath, Karthik
Published: (2013)
Instant Java password and authentication security /
by: Mayoral, Fernando
Published: (2013)
by: Mayoral, Fernando
Published: (2013)
Similar Items
-
Access denied the practice and policy of global Internet filtering /
Published: (2008) -
Access contested : security, identity, and resistance in Asian cyberspace /
Published: (2012) -
Best practices in government information a global perspective /
Published: (2008) -
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics /
Published: (2012) -
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
by: Kim, Chae-yŏng, 1968-
Published: (2002)