Wildy logo
(020) 7242 5778

Wildy’s Book News

Book News cover photo

Vol 23 No 4 April/May 2018

Book of the Month

Cover of Williams, Mortimer and Sunnucks: Executors, Administrators and Probate

Williams, Mortimer and Sunnucks: Executors, Administrators and Probate

Edited by: Alexander Learmonth, Charlotte Ford, Julia Clark, John Ross Martyn
Price: £295.00

Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...

Secondhand & Out of Print

Browse Secondhand Online


Lowe legislation jp
Sealy millman 2018 jp
Court protection no 2
Desmith out now
Uk supremem 1 8
Williams published
This book is now Out of Print.
A new edition has been published, the details can be seen here:
Principles of Cybercrime 2nd ed isbn 9781107698161

Principles of Cybercrime

ISBN13: 9780521728126
New Edition ISBN: 9781107698161
Published: May 2010
Publisher: Cambridge University Press
Country of Publication: UK
Format: Paperback
Price: Out of print

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business.

While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called ‘cybercrimes’.

Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace.

The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes.

Internet Law, Criminal Law
Part I. Introduction
1. Cybercrime
Part II. Computer as Target
2. Computer as target
3. Access offences
4. Impairment of data
5. Misuse of devices
6. Interception of data
Part III. Fraud and Related Offences
7. Fraud
8. Criminal copyright infringement
9. 'SPAM'
Part IV. Content Related Offences:
10. Child pornography
Part V. Offences Against the Person
11. 'Grooming'
12. Cyberstalking
13. Voyeurism
Part VI. Jurisdiction
14. Jurisdiction.