Search Results for Computers-Law and legislation. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputers-Law$002band$002blegislation.$0026ps$003d300?dt=list 2025-02-12T10:48:04Z Bulut bili&#351;im ent://SD_ILS/0/SD_ILS:95095 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Topalo&#287;lu, Murat. Yrd. Do&ccedil;. Dr. yazar.<br/><a href="https://www.turcademy.com/tr/kitap/bulut-bilisim-9789750243400">https://www.turcademy.com/tr/kitap/bulut-bilisim-9789750243400</a><br/>Format:&#160;Books<br/> Do&#287;rudan / dolayl&#305; bili&#351;im su&ccedil;lar&#305; ent://SD_ILS/0/SD_ILS:93963 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;G&uuml;l, Ahmet<br/><a href="https://www.turcademy.com/tr/kitap/bilisim-suclari-9789750239182">https://www.turcademy.com/tr/kitap/bilisim-suclari-9789750239182</a><br/>Format:&#160;Books<br/> Regulating eTechnologies in the European Union Normative Realities and Trends ent://SD_ILS/0/SD_ILS:148851 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Kerikm&auml;e, Tanel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-08117-5">https://doi.org/10.1007/978-3-319-08117-5</a><br/>Format:&#160;Electronic Resources<br/> Protection of Information and the Right to Privacy - A New Equilibrium? ent://SD_ILS/0/SD_ILS:150309 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Floridi, Luciano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-05720-0">https://doi.org/10.1007/978-3-319-05720-0</a><br/>Format:&#160;Electronic Resources<br/> The Emergence of Personal Data Protection as a Fundamental Right of the EU ent://SD_ILS/0/SD_ILS:151311 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gonz&aacute;lez Fuster, Gloria. author.<br/><a href="https://doi.org/10.1007/978-3-319-05023-2">https://doi.org/10.1007/978-3-319-05023-2</a><br/>Format:&#160;Electronic Resources<br/> Minding Minors Wandering the Web: Regulating Online Child Safety ent://SD_ILS/0/SD_ILS:143632 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;van der Hof, Simone. editor.<br/><a href="https://doi.org/10.1007/978-94-6265-005-3">https://doi.org/10.1007/978-94-6265-005-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:143928 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Stalla-Bourdillon, Sophie. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/> Intellectual Property in Consumer Electronics, Software and Technology Startups ent://SD_ILS/0/SD_ILS:143991 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Halt, Jr., Gerald B. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7912-3">https://doi.org/10.1007/978-1-4614-7912-3</a><br/>Format:&#160;Electronic Resources<br/> The Evolution of Global Internet Governance Principles and Policies in the Making ent://SD_ILS/0/SD_ILS:159102 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Radu, Roxana. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45299-4">https://doi.org/10.1007/978-3-642-45299-4</a><br/>Format:&#160;Electronic Resources<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:137546 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;de Andrade, Norberto Nuno Gomes. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Mobile Open Source Technologies 10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San Jos&eacute;, Costa Rica, May 6-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169022 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Corral, Luis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55128-4">https://doi.org/10.1007/978-3-642-55128-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Digital Government Leading and Managing in the Digital Era ent://SD_ILS/0/SD_ILS:169283 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Veit, Daniel. author.<br/><a href="https://doi.org/10.1007/978-3-642-38511-7">https://doi.org/10.1007/978-3-642-38511-7</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 13th IFIP WG 8.5 International Conference, EGOV 2014, Dublin, Ireland, September 1-3, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169944 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Janssen, Marijn. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44426-9">https://doi.org/10.1007/978-3-662-44426-9</a><br/>Format:&#160;Electronic Resources<br/> Legal Principles for Combatting Cyberlaundering ent://SD_ILS/0/SD_ILS:173654 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Leslie, Daniel Adeoy&eacute;. author.<br/><a href="https://doi.org/10.1007/978-3-319-06416-1">https://doi.org/10.1007/978-3-319-06416-1</a><br/>Format:&#160;Electronic Resources<br/> New Technologies and the Law of Armed Conflict ent://SD_ILS/0/SD_ILS:174664 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Nasu, Hitoshi. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-933-7">https://doi.org/10.1007/978-90-6704-933-7</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:164480 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century ent://SD_ILS/0/SD_ILS:165090 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Klitou, Demetrius. author.<br/><a href="https://doi.org/10.1007/978-94-6265-026-8">https://doi.org/10.1007/978-94-6265-026-8</a><br/>Format:&#160;Electronic Resources<br/> Emerging Pervasive Information and Communication Technologies (PICT) Ethical Challenges, Opportunities and Safeguards ent://SD_ILS/0/SD_ILS:166506 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Pimple, Kenneth D. editor.<br/><a href="https://doi.org/10.1007/978-94-007-6833-8">https://doi.org/10.1007/978-94-007-6833-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176522 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Yearbook of International Humanitarian Law Volume 15, 2012 ent://SD_ILS/0/SD_ILS:177097 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gill, Terry D. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-924-5">https://doi.org/10.1007/978-90-6704-924-5</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:177330 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Dunn Cavelty, Myriam. author.<br/><a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/> Disclosure of Security Vulnerabilities Legal and Ethical Issues ent://SD_ILS/0/SD_ILS:148927 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Maurushat, Alana. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5004-6">https://doi.org/10.1007/978-1-4471-5004-6</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Communications, Services and Security 6th International Conference, MCSS 2013, Krakow, Poland, June 6-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:149741 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Dziech, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38559-9">https://doi.org/10.1007/978-3-642-38559-9</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Quality Verification 9th IFIP WG 2.13 International Conference, OSS 2013, Koper-Capodistria, Slovenia, June 25-28, 2013, Proceedings ent://SD_ILS/0/SD_ILS:151558 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Petrinja, Etiel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38928-3">https://doi.org/10.1007/978-3-642-38928-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Biometrics ent://SD_ILS/0/SD_ILS:146170 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Campisi, Patrizio. editor.<br/><a href="https://doi.org/10.1007/978-1-4471-5230-9">https://doi.org/10.1007/978-1-4471-5230-9</a><br/>Format:&#160;Electronic Resources<br/> Coherence: Insights from Philosophy, Jurisprudence and Artificial Intelligence ent://SD_ILS/0/SD_ILS:147055 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Araszkiewicz, Micha&#322;. editor. (orcid)0000-0003-2524-3976<br/><a href="https://doi.org/10.1007/978-94-007-6110-0">https://doi.org/10.1007/978-94-007-6110-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157897 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45330-4">https://doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/> Human Factors on the Flight Deck Safe Piloting Behaviour in Practice ent://SD_ILS/0/SD_ILS:161511 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Ebermann, Hans-Joachim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31733-0">https://doi.org/10.1007/978-3-642-31733-0</a><br/>Format:&#160;Electronic Resources<br/> Data Security Breaches and Privacy in Europe ent://SD_ILS/0/SD_ILS:135206 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wong, Rebecca. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5586-7">https://doi.org/10.1007/978-1-4471-5586-7</a><br/>Format:&#160;Electronic Resources<br/> Countering Brandjacking in the Digital Age ... and Other Hidden Risks to Your Brand ent://SD_ILS/0/SD_ILS:137530 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Hofman, Christopher. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5580-5">https://doi.org/10.1007/978-1-4471-5580-5</a><br/>Format:&#160;Electronic Resources<br/> Human Law and Computer Law: Comparative Perspectives ent://SD_ILS/0/SD_ILS:168404 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Hildebrandt, Mireille. editor.<br/><a href="https://doi.org/10.1007/978-94-007-6314-2">https://doi.org/10.1007/978-94-007-6314-2</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 12th IFIP WG 8.5 International Conference, EGOV 2013, Koblenz, Germany, September 16-19, 2013, Proceedings ent://SD_ILS/0/SD_ILS:171552 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40358-3">https://doi.org/10.1007/978-3-642-40358-3</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172499 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/> Legal Argumentation Theory: Cross-Disciplinary Perspectives ent://SD_ILS/0/SD_ILS:174508 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Dahlman, Christian. editor.<br/><a href="https://doi.org/10.1007/978-94-007-4670-1">https://doi.org/10.1007/978-94-007-4670-1</a><br/>Format:&#160;Electronic Resources<br/> Internet Privacy Options for adequate realisation ent://SD_ILS/0/SD_ILS:175850 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37913-0">https://doi.org/10.1007/978-3-642-37913-0</a><br/>Format:&#160;Electronic Resources<br/> Beyond Data Protection Strategic Case Studies and Practical Guidance ent://SD_ILS/0/SD_ILS:176018 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Ismail, Noriswadi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33081-0">https://doi.org/10.1007/978-3-642-33081-0</a><br/>Format:&#160;Electronic Resources<br/> Resistance, Liberation Technology and Human Rights in the Digital Age ent://SD_ILS/0/SD_ILS:163054 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Ziccardi, Giovanni. author.<br/><a href="https://doi.org/10.1007/978-94-007-5276-4">https://doi.org/10.1007/978-94-007-5276-4</a><br/>Format:&#160;Electronic Resources<br/> Market Integration Through Data Protection An Analysis of the Insurance and Financial Industries in the EU ent://SD_ILS/0/SD_ILS:163330 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Viola de Azevedo Cunha, Mario. author.<br/><a href="https://doi.org/10.1007/978-94-007-6085-1">https://doi.org/10.1007/978-94-007-6085-1</a><br/>Format:&#160;Electronic Resources<br/> Digital Legacy and Interaction Post-Mortem Issues ent://SD_ILS/0/SD_ILS:163465 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Maciel, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-01631-3">https://doi.org/10.1007/978-3-319-01631-3</a><br/>Format:&#160;Electronic Resources<br/> Auditing and GRC Automation in SAP ent://SD_ILS/0/SD_ILS:166555 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chuprunov, Maxim. author.<br/><a href="https://doi.org/10.1007/978-3-642-35302-4">https://doi.org/10.1007/978-3-642-35302-4</a><br/>Format:&#160;Electronic Resources<br/> Gestaltung und Management von IT-Vertr&auml;gen Eine Anleitung f&uuml;r Praktiker ent://SD_ILS/0/SD_ILS:182704 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Erben, Meinhard. author.<br/><a href="https://doi.org/10.1007/978-3-8349-6714-5">https://doi.org/10.1007/978-3-8349-6714-5</a><br/>Format:&#160;Electronic Resources<br/> Recht f&uuml;r Medienberufe Kompaktes Wissen zu allen rechtstypischen Fragen ent://SD_ILS/0/SD_ILS:183932 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Kaesler, Clemens. author.<br/><a href="https://doi.org/10.1007/978-3-658-02011-8">https://doi.org/10.1007/978-3-658-02011-8</a><br/>Format:&#160;Electronic Resources<br/> Informationelle Selbstbestimmung im Web 2.0 Chancen und Risiken sozialer Verschlagwortungssysteme ent://SD_ILS/0/SD_ILS:184432 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Doerfel, Stephan. author.<br/><a href="https://doi.org/10.1007/978-3-642-38056-3">https://doi.org/10.1007/978-3-642-38056-3</a><br/>Format:&#160;Electronic Resources<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:199330 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gantz, Stephen D.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496414">https://www.sciencedirect.com/science/book/9781597496414</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:176951 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/> The Laws of Robots Crimes, Contracts, and Torts ent://SD_ILS/0/SD_ILS:177102 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Pagallo, Ugo. author. (orcid)0000-0001-7981-8849<br/><a href="https://doi.org/10.1007/978-94-007-6564-1">https://doi.org/10.1007/978-94-007-6564-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Data Protection Issues of Biometric Applications A Comparative Legal Analysis ent://SD_ILS/0/SD_ILS:177036 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Kindt, Els J. author.<br/><a href="https://doi.org/10.1007/978-94-007-7522-0">https://doi.org/10.1007/978-94-007-7522-0</a><br/>Format:&#160;Electronic Resources<br/> Privatheit im Internet Chancen wahrnehmen, Risiken einsch&auml;tzen, Vertrauen gestalten ent://SD_ILS/0/SD_ILS:178099 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;acatech, . editor.<br/><a href="https://doi.org/10.1007/978-3-642-37980-2">https://doi.org/10.1007/978-3-642-37980-2</a><br/>Format:&#160;Electronic Resources<br/> Internationales Strafrecht im Cyberspace Strafrechtliche Analyse der Rechtslage in Deutschland, Russland und den USA ent://SD_ILS/0/SD_ILS:190430 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Paramonova, Svetlana. author.<br/><a href="https://doi.org/10.1007/978-3-658-04399-5">https://doi.org/10.1007/978-3-658-04399-5</a><br/>Format:&#160;Electronic Resources<br/> Auctions, Market Mechanisms and Their Applications Second International ICST Conference, AMMA 2011, New York, USA, August 22-23, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142891 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Coles, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30913-7">https://doi.org/10.1007/978-3-642-30913-7</a><br/>Format:&#160;Electronic Resources<br/> Human ICT Implants: Technical, Legal and Ethical Considerations ent://SD_ILS/0/SD_ILS:143000 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gasson, Mark N. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-870-5">https://doi.org/10.1007/978-90-6704-870-5</a><br/>Format:&#160;Electronic Resources<br/> Anonymization ent://SD_ILS/0/SD_ILS:139018 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Weber, Rolf H. author.<br/><a href="https://doi.org/10.1007/978-1-4471-4066-5">https://doi.org/10.1007/978-1-4471-4066-5</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, Kristiansand, Norway, September 3-6, 2012, Proceedings ent://SD_ILS/0/SD_ILS:135278 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Scholl, Hans Jochen. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33489-4">https://doi.org/10.1007/978-3-642-33489-4</a><br/>Format:&#160;Electronic Resources<br/> Software Similarity and Classification ent://SD_ILS/0/SD_ILS:169311 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Cesare, Silvio. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2909-7">https://doi.org/10.1007/978-1-4471-2909-7</a><br/>Format:&#160;Electronic Resources<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:173546 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings ent://SD_ILS/0/SD_ILS:173723 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30428-6">https://doi.org/10.1007/978-3-642-30428-6</a><br/>Format:&#160;Electronic Resources<br/> European Data Protection: In Good Health? ent://SD_ILS/0/SD_ILS:174466 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gutwirth, Serge. editor.<br/><a href="https://doi.org/10.1007/978-94-007-2903-2">https://doi.org/10.1007/978-94-007-2903-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:163163 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/> Internet Privacy Eine multidisziplin&auml;re Bestandsaufnahme/ A multidisciplinary analysis ent://SD_ILS/0/SD_ILS:181980 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31943-3">https://doi.org/10.1007/978-3-642-31943-3</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for legal professionals : understanding digital evidence from the warrant to the courtroom ent://SD_ILS/0/SD_ILS:198661 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Daniel, Larry (Larry E.)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496438">https://www.sciencedirect.com/science/book/9781597496438</a><br/>Format:&#160;Electronic Resources<br/> Google and the Law Empirical Approaches to Legal Aspects of Knowledge-Economy Business Models ent://SD_ILS/0/SD_ILS:176104 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Lopez-Tarruella, Aurelio. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-846-0">https://doi.org/10.1007/978-90-6704-846-0</a><br/>Format:&#160;Electronic Resources<br/> Second Generation Biometrics: The Ethical, Legal and Social Context ent://SD_ILS/0/SD_ILS:177071 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Mordini, Emilio. editor.<br/><a href="https://doi.org/10.1007/978-94-007-3892-8">https://doi.org/10.1007/978-94-007-3892-8</a><br/>Format:&#160;Electronic Resources<br/> Computer- und Internetstrafrecht Ein Grundriss ent://SD_ILS/0/SD_ILS:178235 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Hilgendorf, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-642-16885-7">https://doi.org/10.1007/978-3-642-16885-7</a><br/>Format:&#160;Electronic Resources<br/> Recht ex machina Formalisierung des Rechts im Internet der Dienste ent://SD_ILS/0/SD_ILS:186233 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Raabe, Oliver. author.<br/><a href="https://doi.org/10.1007/978-3-642-17671-5">https://doi.org/10.1007/978-3-642-17671-5</a><br/>Format:&#160;Electronic Resources<br/> Daten- und Identit&auml;tsschutz in Cloud Computing, E-Government und E-Commerce ent://SD_ILS/0/SD_ILS:187100 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Borges, Georg. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30102-5">https://doi.org/10.1007/978-3-642-30102-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:144179 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22039-5">https://doi.org/10.1007/978-3-642-22039-5</a><br/>Format:&#160;Electronic Resources<br/> Forensics in Telecommunications, Information and Multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139559 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Lai, Xuejia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23602-0">https://doi.org/10.1007/978-3-642-23602-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142681 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Baggili, Ibrahim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19513-6">https://doi.org/10.1007/978-3-642-19513-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Life ent://SD_ILS/0/SD_ILS:161234 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20317-6">https://doi.org/10.1007/978-3-642-20317-6</a><br/>Format:&#160;Electronic Resources<br/> Legislative XML for the Semantic Web Principles, Models, Standards for Document Management ent://SD_ILS/0/SD_ILS:161410 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Sartor, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-94-007-1887-6">https://doi.org/10.1007/978-94-007-1887-6</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 10th International Conference, EGOV 2011, Delft, The Netherlands, August 29 -- September 1, 2011, Proceedings ent://SD_ILS/0/SD_ILS:169520 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Janssen, Marijn. editor. (orcid)0000-0001-6211-8790<br/><a href="https://doi.org/10.1007/978-3-642-22878-0">https://doi.org/10.1007/978-3-642-22878-0</a><br/>Format:&#160;Electronic Resources<br/> Analysis of Social Media and Ubiquitous Data International Workshops MSM 2010, Toronto, Canada, June 13, 2010, and MUSE 2010, Barcelona, Spain, September 20, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170868 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Atzmueller, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23599-3">https://doi.org/10.1007/978-3-642-23599-3</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:171772 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-22137-8">https://doi.org/10.1007/978-3-642-22137-8</a><br/>Format:&#160;Electronic Resources<br/> Innovating Government Normative, Policy and Technological Dimensions of Modern Government ent://SD_ILS/0/SD_ILS:174326 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;van der Hof, Simone. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-731-9">https://doi.org/10.1007/978-90-6704-731-9</a><br/>Format:&#160;Electronic Resources<br/> Financial Identity Theft Context, Challenges and Countermeasures ent://SD_ILS/0/SD_ILS:164560 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;van der Meulen, Nicole S. author.<br/><a href="https://doi.org/10.1007/978-90-6704-814-9">https://doi.org/10.1007/978-90-6704-814-9</a><br/>Format:&#160;Electronic Resources<br/> User Generated Content Urheberrechtliche Zul&auml;ssigkeit nutzergenerierter Medieninhalte ent://SD_ILS/0/SD_ILS:182766 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Bauer, Christian Alexander. author.<br/><a href="https://doi.org/10.1007/978-3-642-20068-7">https://doi.org/10.1007/978-3-642-20068-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:177314 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24212-0">https://doi.org/10.1007/978-3-642-24212-0</a><br/>Format:&#160;Electronic Resources<br/> Identit&auml;tsdiebstahl und Identit&auml;tsmissbrauch im Internet Rechtliche und technische Aspekte ent://SD_ILS/0/SD_ILS:178609 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Borges, Georg. author.<br/><a href="https://doi.org/10.1007/978-3-642-15833-9">https://doi.org/10.1007/978-3-642-15833-9</a><br/>Format:&#160;Electronic Resources<br/> Handbuch des Technikrechts Allgemeine Grundlagen Umweltrecht- Gentechnikrecht - Energierecht Telekommunikations- und Medienrecht Patentrecht - Computerrecht ent://SD_ILS/0/SD_ILS:190960 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Schulte, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11884-5">https://doi.org/10.1007/978-3-642-11884-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:147126 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Goel, Sanjay. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11534-9">https://doi.org/10.1007/978-3-642-11534-9</a><br/>Format:&#160;Electronic Resources<br/> The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives ent://SD_ILS/0/SD_ILS:147238 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Kshetri, Nir. author.<br/><a href="https://doi.org/10.1007/978-3-642-11522-6">https://doi.org/10.1007/978-3-642-11522-6</a><br/>Format:&#160;Electronic Resources<br/> I contenuti digitali tecnologie, diritti e libert&agrave; ent://SD_ILS/0/SD_ILS:135223 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Lucchi, Nicola. author.<br/><a href="https://doi.org/10.1007/978-88-470-1399-5">https://doi.org/10.1007/978-88-470-1399-5</a><br/>Format:&#160;Electronic Resources<br/> Shaping Internet Governance: Regulatory Challenges ent://SD_ILS/0/SD_ILS:168592 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Weber, Rolf H. author.<br/><a href="https://doi.org/10.1007/978-3-642-04620-9">https://doi.org/10.1007/978-3-642-04620-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170048 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11207-2">https://doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/> Patent Law for Computer Scientists Steps to Protect Computer-Implemented Inventions ent://SD_ILS/0/SD_ILS:162810 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Closa, Daniel. author.<br/><a href="https://doi.org/10.1007/978-3-642-05078-7">https://doi.org/10.1007/978-3-642-05078-7</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things Legal Perspectives ent://SD_ILS/0/SD_ILS:166708 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Weber, Rolf H. author.<br/><a href="https://doi.org/10.1007/978-3-642-11710-7">https://doi.org/10.1007/978-3-642-11710-7</a><br/>Format:&#160;Electronic Resources<br/> Nutzergenerierte Inhalte als Gegenstand des Privatrechts Aktuelle Probleme des Web 2.0 ent://SD_ILS/0/SD_ILS:184817 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gro&szlig;e Ruse-Khan, Henning. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12411-2">https://doi.org/10.1007/978-3-642-12411-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176137 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chow, Kam-Pui. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15506-2">https://doi.org/10.1007/978-3-642-15506-2</a><br/>Format:&#160;Electronic Resources<br/> Sicherheitsforschung Chancen und Perspektiven ent://SD_ILS/0/SD_ILS:189542 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Bach, Friedrich-Wilhelm. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04981-1">https://doi.org/10.1007/978-3-642-04981-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Location-Based Applications Research Issues and Emerging Trends ent://SD_ILS/0/SD_ILS:147888 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Bettini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03511-1">https://doi.org/10.1007/978-3-642-03511-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142927 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01718-6">https://doi.org/10.1007/978-3-642-01718-6</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 8th International Conference, EGOV 2009, Linz, Austria, August 31 - September 3, 2009, Proceedings ent://SD_ILS/0/SD_ILS:143857 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03516-6">https://doi.org/10.1007/978-3-642-03516-6</a><br/>Format:&#160;Electronic Resources<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144353 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Maty&aacute;&scaron;, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03315-5">https://doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/> International Safeguards and Satellite Imagery Key Features of the Nuclear Fuel Cycle and Computer-Based Analysis ent://SD_ILS/0/SD_ILS:144448 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Jasani, Bhupendra. editor.<br/><a href="https://doi.org/10.1007/978-3-540-79132-4">https://doi.org/10.1007/978-3-540-79132-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:138859 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01393-5">https://doi.org/10.1007/978-3-642-01393-5</a><br/>Format:&#160;Electronic Resources<br/> Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139394 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Sorell, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02312-5">https://doi.org/10.1007/978-3-642-02312-5</a><br/>Format:&#160;Electronic Resources<br/> Electronic Participation First International Conference, ePart 2009 Linz, Austria, August 31-September 4, 2009 Proceedings ent://SD_ILS/0/SD_ILS:142041 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Macintosh, Ann. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03781-8">https://doi.org/10.1007/978-3-642-03781-8</a><br/>Format:&#160;Electronic Resources<br/> Business Information Systems Workshops BIS 2009 International Workshops, Poznan, Poland, April 27-29, 2009, Revised Papers ent://SD_ILS/0/SD_ILS:162191 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Abramowicz, Witold. editor. (orcid)0000-0001-5464-9698<br/><a href="https://doi.org/10.1007/978-3-642-03424-4">https://doi.org/10.1007/978-3-642-03424-4</a><br/>Format:&#160;Electronic Resources<br/> Internet Policy and Economics Challenges and Perspectives ent://SD_ILS/0/SD_ILS:137932 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Lehr, William H. editor.<br/><a href="https://doi.org/10.1007/b104899">https://doi.org/10.1007/b104899</a><br/>Format:&#160;Electronic Resources<br/> Elektronik haberle&#351;me alan&#305;nda ki&#351;isel verilerin &ouml;zel hukuk h&uuml;k&uuml;mlerine g&ouml;re korunmas&#305; ent://SD_ILS/0/SD_ILS:95100 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;&Ouml;zdemir, Hayrunnisa<br/><a href="https://www.turcademy.com/tr/kitap/kisisel-verilerin-ozel-hukuk-hukumlerine-gore-korunmasi-9789750210778">https://www.turcademy.com/tr/kitap/kisisel-verilerin-ozel-hukuk-hukumlerine-gore-korunmasi-9789750210778</a><br/>Format:&#160;Books<br/> Online Communities and Social Computing Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings ent://SD_ILS/0/SD_ILS:171119 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Ozok, A. Ant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02774-1">https://doi.org/10.1007/978-3-642-02774-1</a><br/>Format:&#160;Electronic Resources<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172569 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Gal, Cecilia S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10233-2">https://doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics V Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:174515 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04155-6">https://doi.org/10.1007/978-3-642-04155-6</a><br/>Format:&#160;Electronic Resources<br/> Computational Forensics Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedings ent://SD_ILS/0/SD_ILS:175001 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Geradts, Zeno J. M. H. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03521-0">https://doi.org/10.1007/978-3-642-03521-0</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176981 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Katzenbeisser, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04431-1">https://doi.org/10.1007/978-3-642-04431-1</a><br/>Format:&#160;Electronic Resources<br/> Privatsph&auml;re durch die Delegation von Rechten ent://SD_ILS/0/SD_ILS:180186 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wohlgemuth, Sven. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9308-6">https://doi.org/10.1007/978-3-8348-9308-6</a><br/>Format:&#160;Electronic Resources<br/> Die Beschlagnahme elektronisch gespeicherter Daten bei privaten Tr&auml;gern von Berufsgeheimnissen ent://SD_ILS/0/SD_ILS:192722 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Korge, Tobias. author.<br/><a href="https://doi.org/10.1007/978-3-540-88749-2">https://doi.org/10.1007/978-3-540-88749-2</a><br/>Format:&#160;Electronic Resources<br/> Safeguards in a World of Ambient Intelligence ent://SD_ILS/0/SD_ILS:155500 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wright, David. editor.<br/><a href="https://doi.org/10.1007/978-1-4020-6662-7">https://doi.org/10.1007/978-1-4020-6662-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the IFIP TC 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:151942 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09699-5">https://doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:140542 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89900-6">https://doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:136068 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09428-1">https://doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings ent://SD_ILS/0/SD_ILS:172926 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87471-3">https://doi.org/10.1007/978-3-540-87471-3</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Digital and Multimedia Forensic Evidence ent://SD_ILS/0/SD_ILS:173994 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Barbara, John J. editor.<br/><a href="https://doi.org/10.1007/978-1-59745-577-0">https://doi.org/10.1007/978-1-59745-577-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers ent://SD_ILS/0/SD_ILS:175837 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78478-4">https://doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> EU Digital Copyright Law and the End-User ent://SD_ILS/0/SD_ILS:163595 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Mazziotti, Giuseppe. author.<br/><a href="https://doi.org/10.1007/978-3-540-76985-0">https://doi.org/10.1007/978-3-540-76985-0</a><br/>Format:&#160;Electronic Resources<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:176155 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Goodall, John R. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78243-8">https://doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/> Mobility, Data Mining and Privacy Geographic Knowledge Discovery ent://SD_ILS/0/SD_ILS:176771 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Giannotti, Fosca. editor. (orcid)0000-0003-3099-3835<br/><a href="https://doi.org/10.1007/978-3-540-75177-9">https://doi.org/10.1007/978-3-540-75177-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Torino, Italy, August 31 - September 5, 2008, Proceedings ent://SD_ILS/0/SD_ILS:177720 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-540-85204-9">https://doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> Recht f&uuml;r Ingenieure Zivilrecht, &Ouml;ffentliches Recht, Europarecht ent://SD_ILS/0/SD_ILS:178330 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Frenz, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-76354-3">https://doi.org/10.1007/978-3-540-76354-3</a><br/>Format:&#160;Electronic Resources<br/> Medienrecht und Medienm&auml;rkte ent://SD_ILS/0/SD_ILS:188455 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Fischer, Joerg K. author.<br/><a href="https://doi.org/10.1007/978-3-540-72222-9">https://doi.org/10.1007/978-3-540-72222-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Banking und Datenschutz Rechtsfragen und Praxis ent://SD_ILS/0/SD_ILS:189221 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Kahler, Thomas. author.<br/><a href="https://doi.org/10.1007/978-3-540-72224-3">https://doi.org/10.1007/978-3-540-72224-3</a><br/>Format:&#160;Electronic Resources<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:146851 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-540-75670-5">https://doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings ent://SD_ILS/0/SD_ILS:142541 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Yang, Christopher C. editor.<br/><a href="https://doi.org/10.1007/978-3-540-71549-8">https://doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Digital Decision Making Back to the Future ent://SD_ILS/0/SD_ILS:160215 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Corrigan, Ray. author.<br/><a href="https://doi.org/10.1007/978-1-84628-673-5">https://doi.org/10.1007/978-1-84628-673-5</a><br/>Format:&#160;Electronic Resources<br/> Cyberlaw, security &amp; privacy ent://SD_ILS/0/SD_ILS:45763 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Cyberlaw, security &amp; privacy : the second international conference on legal, security and privacy issues in information technology : (December 5-7, 2007 : China)<br/>Format:&#160;Books<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis ent://SD_ILS/0/SD_ILS:168431 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/978-1-84628-750-3">https://doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings ent://SD_ILS/0/SD_ILS:170156 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Schuler, Douglas. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73257-0">https://doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Goverment 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007, Proceedings ent://SD_ILS/0/SD_ILS:172421 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74444-3">https://doi.org/10.1007/978-3-540-74444-3</a><br/>Format:&#160;Electronic Resources<br/> Praxis des IT-Rechts Praktische Rechtsfragen der IT-Sicherheit und Internetnutzung ent://SD_ILS/0/SD_ILS:178083 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Speichert, Horst. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9205-8">https://doi.org/10.1007/978-3-8348-9205-8</a><br/>Format:&#160;Electronic Resources<br/> Recordkeeping, Ethics and Law Regulatory Models, Participant Relationships and Rights and Responsibilities in the Online World ent://SD_ILS/0/SD_ILS:155104 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Iacovino, Livia. author.<br/><a href="https://doi.org/10.1007/1-4020-4714-2">https://doi.org/10.1007/1-4020-4714-2</a><br/>Format:&#160;Electronic Resources<br/> The Information Society: Emerging Landscapes IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005 ent://SD_ILS/0/SD_ILS:136873 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Zielinski, Chris. editor.<br/><a href="https://doi.org/10.1007/0-387-31168-8">https://doi.org/10.1007/0-387-31168-8</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:168669 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Blyth, Andrew. author.<br/><a href="https://doi.org/10.1007/1-84628-489-9">https://doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence ent://SD_ILS/0/SD_ILS:168934 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/1-84628-352-3">https://doi.org/10.1007/1-84628-352-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings ent://SD_ILS/0/SD_ILS:170763 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/11930242">https://doi.org/10.1007/11930242</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. ent://SD_ILS/0/SD_ILS:171913 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Mehrotra, Sharad. editor.<br/><a href="https://doi.org/10.1007/11760146">https://doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/> Digital Rights Management Technologies, Issues, Challenges and Systems ent://SD_ILS/0/SD_ILS:172978 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="https://doi.org/10.1007/11787952">https://doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings ent://SD_ILS/0/SD_ILS:174745 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/11734628">https://doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings ent://SD_ILS/0/SD_ILS:175768 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/11823100">https://doi.org/10.1007/11823100</a><br/>Format:&#160;Electronic Resources<br/> Handbuch IT in der Verwaltung ent://SD_ILS/0/SD_ILS:184762 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wind, Martin. editor.<br/><a href="https://doi.org/10.1007/3-540-46272-4">https://doi.org/10.1007/3-540-46272-4</a><br/>Format:&#160;Electronic Resources<br/> Datenschutzrecht - Schnell erfasst ent://SD_ILS/0/SD_ILS:189629 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Moos, Flemming. author.<br/><a href="https://doi.org/10.1007/978-3-540-39092-3">https://doi.org/10.1007/978-3-540-39092-3</a><br/>Format:&#160;Electronic Resources<br/> Legal Programming Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond ent://SD_ILS/0/SD_ILS:152067 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Subirana, Brian. author.<br/><a href="https://doi.org/10.1007/b101542">https://doi.org/10.1007/b101542</a><br/>Format:&#160;Electronic Resources<br/> Perspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbook ent://SD_ILS/0/SD_ILS:142864 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Berleur, Jacques. editor.<br/><a href="https://doi.org/10.1007/b135654">https://doi.org/10.1007/b135654</a><br/>Format:&#160;Electronic Resources<br/> E-Government: Towards Electronic Democracy International Conference, TCGOV 2005, Bolzano, Italy, March 2-4, 2005, Proceedings ent://SD_ILS/0/SD_ILS:146424 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;B&ouml;hlen, Michael. editor.<br/><a href="https://doi.org/10.1007/b106542">https://doi.org/10.1007/b106542</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings ent://SD_ILS/0/SD_ILS:142224 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Kantor, Paul. editor.<br/><a href="https://doi.org/10.1007/b136511">https://doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/> Virtual Organizations Systems and Practices ent://SD_ILS/0/SD_ILS:136171 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="https://doi.org/10.1007/b102339">https://doi.org/10.1007/b102339</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings ent://SD_ILS/0/SD_ILS:170010 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/11545156">https://doi.org/10.1007/11545156</a><br/>Format:&#160;Electronic Resources<br/> Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human-Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings ent://SD_ILS/0/SD_ILS:171794 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Shimojo, Shinji. editor.<br/><a href="https://doi.org/10.1007/11527725">https://doi.org/10.1007/11527725</a><br/>Format:&#160;Electronic Resources<br/> Computer- und Internetstrafrecht Ein Grundriss ent://SD_ILS/0/SD_ILS:180726 2025-02-12T10:48:04Z 2025-02-12T10:48:04Z by&#160;Hilgendorf, Eric. author.<br/><a href="https://doi.org/10.1007/3-540-27641-6">https://doi.org/10.1007/3-540-27641-6</a><br/>Format:&#160;Electronic Resources<br/>