图书介绍

THE CRIMINAL LAW OF INTELLECTUAL PROPERTY AND INFORMATION:INFORMATIONpdf电子书版本下载

THE CRIMINAL LAW OF INTELLECTUAL PROPERTY AND INFORMATION:INFORMATION
  • GERALDINE SZOTT MOOHR 著
  • 出版社: THOMSON WEST
  • ISBN:0314154310
  • 出版时间:2008
  • 标注页数:519页
  • 文件大小:29MB
  • 文件页数:549页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

THE CRIMINAL LAW OF INTELLECTUAL PROPERTY AND INFORMATION:INFORMATIONPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART Ⅰ. THE COMMON LAW OF THEFT AND MISAPPROPRIATION 2

Chapter 1. Introduction 2

A. "What Is Stolen Must Be Property" 2

B. Expanding Conceptions of Property and Conduct 4

Chapter 2. The Common Law of Theft 17

A. Introduction 17

B. The Mens Rea of Theft Offenses 18

C. The Property Element of Theft Offenses 29

D. Property Issues Raised by Computer Use 40

Chapter 3. Misappropriation and Conversion 60

A. What Is Misappropriation? 61

B. Modern Applications of Misappropriation Doctrine 72

C. What Is Conversion? 87

PART Ⅱ. CRIMES OF INTELLECTUAL PROPERTY AND INFORMATIO 112

NChapter 4. Trade Secrets and the Economic Espionage Act 112

A. What Is a Trade Secret? 113

B. Why Are Trade Secrets Protected? 128

C. The Economic Espionage Act 144

D. Policy Implications of the EEA 177

Chapter 5. Fraudulent Misappropriation of Information 192

A. Federal Mail and Wire Fraud 193

B. Fraud and Confidential Information 221

C. Refining the Property Element 238

D. Insider Trading 267

Chapter 6. Criminal Copyright Infringement 291

A. The Rationale of Copyright Law 292

B. Criminal Copyright Infringement—The Basic Offense 303

C. Copyright Infringement as Theft and Fraud 324

D. New Copyright Crimes 348

PART Ⅲ. RELATED OFFENSES 380

Chapter 7. Identity Theft 380

A. What Is Identity Theft? 381

B. The Federal Criminal Scheme 391

Chapter 8. Computer Fraud and Abuse 420

A. The Computer Fraud and Abuse Act 420

B. Damaging Computers 423

C. Using Computers to Defraud and Misappropriate 444

D. Using Computers for Spam 468

STATUTORY APPENDIX 482

INDEX 515

精品推荐