Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia /
Enregistré dans:
Auteur principal: | Yangyue, Liu (Auteur) |
---|---|
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Newcastle upon Tyne, England :
Cambridge Scholars Publishing,
2014.
|
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Access denied the practice and policy of global Internet filtering /
Publié: (2008)
Publié: (2008)
Access contested : security, identity, and resistance in Asian cyberspace /
Publié: (2012)
Publié: (2012)
Best practices in government information a global perspective /
Publié: (2008)
Publié: (2008)
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics /
Publié: (2012)
Publié: (2012)
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
par: Kim, Chae-yŏng, 1968-
Publié: (2002)
par: Kim, Chae-yŏng, 1968-
Publié: (2002)
The net delusion the dark side of internet freedom /
par: Morozov, Evgeny
Publié: (2011)
par: Morozov, Evgeny
Publié: (2011)
Identity management for internet of things /
par: Mahalle, Parikshit N., et autres
Publié: (2015)
par: Mahalle, Parikshit N., et autres
Publié: (2015)
Archival silences : missing, lost and, uncreated archives /
Publié: (2021)
Publié: (2021)
Role mining in business taming role-based access control administration /
par: Colantonio, Alessandro
Publié: (2012)
par: Colantonio, Alessandro
Publié: (2012)
Role-based access control
par: Ferraiolo, David
Publié: (2003)
par: Ferraiolo, David
Publié: (2003)
Role-based access control
par: Ferraiolo, David
Publié: (2007)
par: Ferraiolo, David
Publié: (2007)
Access Denied : The Practice and Policy of Global Internet Filtering /
Publié: (2008)
Publié: (2008)
The Social Dynamics of Open Data /
Publié: (2018)
Publié: (2018)
Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /
Publié: (2010)
Publié: (2010)
Effect of the HIPAA privacy rule on health research proceedings of a workshop presented to the National Cancer Policy Forum /
Publié: (2006)
Publié: (2006)
Internet freedom software and illicit activity : supporting human rights without enabling criminals /
par: Romanosky, Sasha
Publié: (2015)
par: Romanosky, Sasha
Publié: (2015)
Transparency and secrecy a reader linking literature and contemporary debate /
Publié: (2010)
Publié: (2010)
Networks and states the global politics of internet governance /
par: Mueller, Milton
Publié: (2010)
par: Mueller, Milton
Publié: (2010)
Relation based access control /
par: Zhang, Rui
Publié: (2010)
par: Zhang, Rui
Publié: (2010)
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
par: Thangasamy, Indira
Publié: (2011)
par: Thangasamy, Indira
Publié: (2011)
Institutions guaranteeing access to information : OECD and MENA region /
Publié: (2019)
Publié: (2019)
Access to information in Africa law, culture and practice /
Publié: (2013)
Publié: (2013)
Building DMZs for Enterprise networks
Publié: (2003)
Publié: (2003)
Digital privacy in the marketplace : perspectives on the information exchange /
par: Milne, George R.
Publié: (2015)
par: Milne, George R.
Publié: (2015)
Beyond cybersecurity : protecting your digital business /
par: Kaplan, James M.
Publié: (2015)
par: Kaplan, James M.
Publié: (2015)
Who controls the Internet? illusions of a borderless world /
par: Goldsmith, Jack L.
Publié: (2006)
par: Goldsmith, Jack L.
Publié: (2006)
Government information in Canada : access and stewardship /
Publié: (2019)
Publié: (2019)
OAuth 2.0 identity and access management patterns /
par: Spasovski, Martin
Publié: (2013)
par: Spasovski, Martin
Publié: (2013)
Deployment guide series IBM Tivoli Security Compliance Manager /
par: Bücker, Axel
Publié: (2005)
par: Bücker, Axel
Publié: (2005)
Recent advances in providing QoS and reliability in the future Internet backbone
Publié: (2011)
Publié: (2011)
Security assessment case studies for implementing the NSA lAM /
par: Rogers, Russ
Publié: (2004)
par: Rogers, Russ
Publié: (2004)
Internet policies and issues
Publié: (2011)
Publié: (2011)
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Publié: (2012)
Publié: (2012)
Freedom of Information Act.
par: Singleton, Susan
Publié: (2008)
par: Singleton, Susan
Publié: (2008)
Measurement and reduction of administrative burdens in Greece : an overview of 13 sectors /
Publié: (2014)
Publié: (2014)
The devil's long tail : religious and other radicals in the internet marketplace /
par: Stevens, David (Lecturer in political theory), et autres
Publié: (2015)
par: Stevens, David (Lecturer in political theory), et autres
Publié: (2015)
Internet freedom & political space /
par: Tkacheva, Olesya
Publié: (2013)
par: Tkacheva, Olesya
Publié: (2013)
Broadband access : wireline and wireless, alternatives for internet services /
par: Gorshe, Steve
Publié: (2014)
par: Gorshe, Steve
Publié: (2014)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
par: Cardwell, Kevin
Publié: (2014)
par: Cardwell, Kevin
Publié: (2014)
Perfect passwords selection, protection, authentication /
par: Burnett, Mark
Publié: (2006)
par: Burnett, Mark
Publié: (2006)
Documents similaires
-
Access denied the practice and policy of global Internet filtering /
Publié: (2008) -
Access contested : security, identity, and resistance in Asian cyberspace /
Publié: (2012) -
Best practices in government information a global perspective /
Publié: (2008) -
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics /
Publié: (2012) -
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
par: Kim, Chae-yŏng, 1968-
Publié: (2002)