This book examines the law and politics of the Protocol on Ireland/Northern Ireland, attached to the Withdrawal Agreement, which regulates the terms of Brexit. Meer
The American Convention on Human Rights: A Commentary is the first comprehensive and systematic article-by-article commentary of the American Convention on Human Rights (ACHR) in English. Meer
By adopting a multi-disciplinary approach, this book provides a comprehensive analysis of the legality of the use of autonomous weapons systems under international law. Meer
Wars have a destructive impact on society. The violence in the first case is domicide, in the second urbicide, in the third genocide, and in the fourth, the book introduces a neologism, sociocide, the killing of society. Meer
This innovative Research Handbook explores judicial, scholarly, and theoretical approaches to general principles in the EU legal order against the backdrop of considerable uncertainty about the concept. Meer
A comparative and comprehensive account of the jurisprudence of constitutional conflict between the Court of Justice and national courts with the power of constitutional review. Meer
International Law presents a comprehensive yet student-focused approach to the subject, providing a contemporary and stimulating account of international law. Meer
64,25
Op werkdagen voor 21:00 besteld, volgende dag in huis
This forward-thinking book examines numerous features in the European Union (EU) legal system that serve to reduce legal uncertainty in the preliminary reference procedure and the rulings of the Court of Justice. Meer
In light of the current state of European integration, EU law cannot meaningfully be appreciated without understanding the political, social and cultural context within which it operates. Meer
This book addresses the transformation of the models of movable property in commercial and financial transactions between professionals in the international flow of goods, services, money, information, and technology. Meer
Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Meer