Search Results for Computers-Law and legislation.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dComputers-Law$002band$002blegislation.$0026ps$003d300?dt=list2025-02-12T10:48:04ZBulut bilişiment://SD_ILS/0/SD_ILS:950952025-02-12T10:48:04Z2025-02-12T10:48:04Zby Topaloğlu, Murat. Yrd. Doç. Dr. yazar.<br/><a href="https://www.turcademy.com/tr/kitap/bulut-bilisim-9789750243400">https://www.turcademy.com/tr/kitap/bulut-bilisim-9789750243400</a><br/>Format: Books<br/>Doğrudan / dolaylı bilişim suçlarıent://SD_ILS/0/SD_ILS:939632025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gül, Ahmet<br/><a href="https://www.turcademy.com/tr/kitap/bilisim-suclari-9789750239182">https://www.turcademy.com/tr/kitap/bilisim-suclari-9789750239182</a><br/>Format: Books<br/>Regulating eTechnologies in the European Union Normative Realities and Trendsent://SD_ILS/0/SD_ILS:1488512025-02-12T10:48:04Z2025-02-12T10:48:04Zby Kerikmäe, Tanel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-08117-5">https://doi.org/10.1007/978-3-319-08117-5</a><br/>Format: Electronic Resources<br/>Protection of Information and the Right to Privacy - A New Equilibrium?ent://SD_ILS/0/SD_ILS:1503092025-02-12T10:48:04Z2025-02-12T10:48:04Zby Floridi, Luciano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-05720-0">https://doi.org/10.1007/978-3-319-05720-0</a><br/>Format: Electronic Resources<br/>The Emergence of Personal Data Protection as a Fundamental Right of the EUent://SD_ILS/0/SD_ILS:1513112025-02-12T10:48:04Z2025-02-12T10:48:04Zby González Fuster, Gloria. author.<br/><a href="https://doi.org/10.1007/978-3-319-05023-2">https://doi.org/10.1007/978-3-319-05023-2</a><br/>Format: Electronic Resources<br/>Minding Minors Wandering the Web: Regulating Online Child Safetyent://SD_ILS/0/SD_ILS:1436322025-02-12T10:48:04Z2025-02-12T10:48:04Zby van der Hof, Simone. editor.<br/><a href="https://doi.org/10.1007/978-94-6265-005-3">https://doi.org/10.1007/978-94-6265-005-3</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:1439282025-02-12T10:48:04Z2025-02-12T10:48:04Zby Stalla-Bourdillon, Sophie. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Intellectual Property in Consumer Electronics, Software and Technology Startupsent://SD_ILS/0/SD_ILS:1439912025-02-12T10:48:04Z2025-02-12T10:48:04Zby Halt, Jr., Gerald B. author.<br/><a href="https://doi.org/10.1007/978-1-4614-7912-3">https://doi.org/10.1007/978-1-4614-7912-3</a><br/>Format: Electronic Resources<br/>The Evolution of Global Internet Governance Principles and Policies in the Makingent://SD_ILS/0/SD_ILS:1591022025-02-12T10:48:04Z2025-02-12T10:48:04Zby Radu, Roxana. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45299-4">https://doi.org/10.1007/978-3-642-45299-4</a><br/>Format: Electronic Resources<br/>Electronic Identityent://SD_ILS/0/SD_ILS:1375462025-02-12T10:48:04Z2025-02-12T10:48:04Zby de Andrade, Norberto Nuno Gomes. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>Open Source Software: Mobile Open Source Technologies 10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San José, Costa Rica, May 6-9, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1690222025-02-12T10:48:04Z2025-02-12T10:48:04Zby Corral, Luis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55128-4">https://doi.org/10.1007/978-3-642-55128-4</a><br/>Format: Electronic Resources<br/>Foundations of Digital Government Leading and Managing in the Digital Eraent://SD_ILS/0/SD_ILS:1692832025-02-12T10:48:04Z2025-02-12T10:48:04Zby Veit, Daniel. author.<br/><a href="https://doi.org/10.1007/978-3-642-38511-7">https://doi.org/10.1007/978-3-642-38511-7</a><br/>Format: Electronic Resources<br/>Electronic Government 13th IFIP WG 8.5 International Conference, EGOV 2014, Dublin, Ireland, September 1-3, 2014, Proceedingsent://SD_ILS/0/SD_ILS:1699442025-02-12T10:48:04Z2025-02-12T10:48:04Zby Janssen, Marijn. editor.<br/><a href="https://doi.org/10.1007/978-3-662-44426-9">https://doi.org/10.1007/978-3-662-44426-9</a><br/>Format: Electronic Resources<br/>Legal Principles for Combatting Cyberlaunderingent://SD_ILS/0/SD_ILS:1736542025-02-12T10:48:04Z2025-02-12T10:48:04Zby Leslie, Daniel Adeoyé. author.<br/><a href="https://doi.org/10.1007/978-3-319-06416-1">https://doi.org/10.1007/978-3-319-06416-1</a><br/>Format: Electronic Resources<br/>New Technologies and the Law of Armed Conflictent://SD_ILS/0/SD_ILS:1746642025-02-12T10:48:04Z2025-02-12T10:48:04Zby Nasu, Hitoshi. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-933-7">https://doi.org/10.1007/978-90-6704-933-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1644802025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Centuryent://SD_ILS/0/SD_ILS:1650902025-02-12T10:48:04Z2025-02-12T10:48:04Zby Klitou, Demetrius. author.<br/><a href="https://doi.org/10.1007/978-94-6265-026-8">https://doi.org/10.1007/978-94-6265-026-8</a><br/>Format: Electronic Resources<br/>Emerging Pervasive Information and Communication Technologies (PICT) Ethical Challenges, Opportunities and Safeguardsent://SD_ILS/0/SD_ILS:1665062025-02-12T10:48:04Z2025-02-12T10:48:04Zby Pimple, Kenneth D. editor.<br/><a href="https://doi.org/10.1007/978-94-007-6833-8">https://doi.org/10.1007/978-94-007-6833-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:1765222025-02-12T10:48:04Z2025-02-12T10:48:04Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Yearbook of International Humanitarian Law Volume 15, 2012ent://SD_ILS/0/SD_ILS:1770972025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gill, Terry D. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-924-5">https://doi.org/10.1007/978-90-6704-924-5</a><br/>Format: Electronic Resources<br/>Cybersecurity in Switzerlandent://SD_ILS/0/SD_ILS:1773302025-02-12T10:48:04Z2025-02-12T10:48:04Zby Dunn Cavelty, Myriam. author.<br/><a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Disclosure of Security Vulnerabilities Legal and Ethical Issuesent://SD_ILS/0/SD_ILS:1489272025-02-12T10:48:04Z2025-02-12T10:48:04Zby Maurushat, Alana. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5004-6">https://doi.org/10.1007/978-1-4471-5004-6</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 6th International Conference, MCSS 2013, Krakow, Poland, June 6-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:1497412025-02-12T10:48:04Z2025-02-12T10:48:04Zby Dziech, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38559-9">https://doi.org/10.1007/978-3-642-38559-9</a><br/>Format: Electronic Resources<br/>Open Source Software: Quality Verification 9th IFIP WG 2.13 International Conference, OSS 2013, Koper-Capodistria, Slovenia, June 25-28, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1515582025-02-12T10:48:04Z2025-02-12T10:48:04Zby Petrinja, Etiel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38928-3">https://doi.org/10.1007/978-3-642-38928-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Biometricsent://SD_ILS/0/SD_ILS:1461702025-02-12T10:48:04Z2025-02-12T10:48:04Zby Campisi, Patrizio. editor.<br/><a href="https://doi.org/10.1007/978-1-4471-5230-9">https://doi.org/10.1007/978-1-4471-5230-9</a><br/>Format: Electronic Resources<br/>Coherence: Insights from Philosophy, Jurisprudence and Artificial Intelligenceent://SD_ILS/0/SD_ILS:1470552025-02-12T10:48:04Z2025-02-12T10:48:04Zby Araszkiewicz, Michał. editor. (orcid)0000-0003-2524-3976<br/><a href="https://doi.org/10.1007/978-94-007-6110-0">https://doi.org/10.1007/978-94-007-6110-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1578972025-02-12T10:48:04Z2025-02-12T10:48:04Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45330-4">https://doi.org/10.1007/978-3-642-45330-4</a><br/>Format: Electronic Resources<br/>Human Factors on the Flight Deck Safe Piloting Behaviour in Practiceent://SD_ILS/0/SD_ILS:1615112025-02-12T10:48:04Z2025-02-12T10:48:04Zby Ebermann, Hans-Joachim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31733-0">https://doi.org/10.1007/978-3-642-31733-0</a><br/>Format: Electronic Resources<br/>Data Security Breaches and Privacy in Europeent://SD_ILS/0/SD_ILS:1352062025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wong, Rebecca. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5586-7">https://doi.org/10.1007/978-1-4471-5586-7</a><br/>Format: Electronic Resources<br/>Countering Brandjacking in the Digital Age ... and Other Hidden Risks to Your Brandent://SD_ILS/0/SD_ILS:1375302025-02-12T10:48:04Z2025-02-12T10:48:04Zby Hofman, Christopher. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5580-5">https://doi.org/10.1007/978-1-4471-5580-5</a><br/>Format: Electronic Resources<br/>Human Law and Computer Law: Comparative Perspectivesent://SD_ILS/0/SD_ILS:1684042025-02-12T10:48:04Z2025-02-12T10:48:04Zby Hildebrandt, Mireille. editor.<br/><a href="https://doi.org/10.1007/978-94-007-6314-2">https://doi.org/10.1007/978-94-007-6314-2</a><br/>Format: Electronic Resources<br/>Electronic Government 12th IFIP WG 8.5 International Conference, EGOV 2013, Koblenz, Germany, September 16-19, 2013, Proceedingsent://SD_ILS/0/SD_ILS:1715522025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-40358-3">https://doi.org/10.1007/978-3-642-40358-3</a><br/>Format: Electronic Resources<br/>Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:1724992025-02-12T10:48:04Z2025-02-12T10:48:04Zby Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Legal Argumentation Theory: Cross-Disciplinary Perspectivesent://SD_ILS/0/SD_ILS:1745082025-02-12T10:48:04Z2025-02-12T10:48:04Zby Dahlman, Christian. editor.<br/><a href="https://doi.org/10.1007/978-94-007-4670-1">https://doi.org/10.1007/978-94-007-4670-1</a><br/>Format: Electronic Resources<br/>Internet Privacy Options for adequate realisationent://SD_ILS/0/SD_ILS:1758502025-02-12T10:48:04Z2025-02-12T10:48:04Zby Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-642-37913-0">https://doi.org/10.1007/978-3-642-37913-0</a><br/>Format: Electronic Resources<br/>Beyond Data Protection Strategic Case Studies and Practical Guidanceent://SD_ILS/0/SD_ILS:1760182025-02-12T10:48:04Z2025-02-12T10:48:04Zby Ismail, Noriswadi. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33081-0">https://doi.org/10.1007/978-3-642-33081-0</a><br/>Format: Electronic Resources<br/>Resistance, Liberation Technology and Human Rights in the Digital Ageent://SD_ILS/0/SD_ILS:1630542025-02-12T10:48:04Z2025-02-12T10:48:04Zby Ziccardi, Giovanni. author.<br/><a href="https://doi.org/10.1007/978-94-007-5276-4">https://doi.org/10.1007/978-94-007-5276-4</a><br/>Format: Electronic Resources<br/>Market Integration Through Data Protection An Analysis of the Insurance and Financial Industries in the EUent://SD_ILS/0/SD_ILS:1633302025-02-12T10:48:04Z2025-02-12T10:48:04Zby Viola de Azevedo Cunha, Mario. author.<br/><a href="https://doi.org/10.1007/978-94-007-6085-1">https://doi.org/10.1007/978-94-007-6085-1</a><br/>Format: Electronic Resources<br/>Digital Legacy and Interaction Post-Mortem Issuesent://SD_ILS/0/SD_ILS:1634652025-02-12T10:48:04Z2025-02-12T10:48:04Zby Maciel, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-01631-3">https://doi.org/10.1007/978-3-319-01631-3</a><br/>Format: Electronic Resources<br/>Auditing and GRC Automation in SAPent://SD_ILS/0/SD_ILS:1665552025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chuprunov, Maxim. author.<br/><a href="https://doi.org/10.1007/978-3-642-35302-4">https://doi.org/10.1007/978-3-642-35302-4</a><br/>Format: Electronic Resources<br/>Gestaltung und Management von IT-Verträgen Eine Anleitung für Praktikerent://SD_ILS/0/SD_ILS:1827042025-02-12T10:48:04Z2025-02-12T10:48:04Zby Erben, Meinhard. author.<br/><a href="https://doi.org/10.1007/978-3-8349-6714-5">https://doi.org/10.1007/978-3-8349-6714-5</a><br/>Format: Electronic Resources<br/>Recht für Medienberufe Kompaktes Wissen zu allen rechtstypischen Fragenent://SD_ILS/0/SD_ILS:1839322025-02-12T10:48:04Z2025-02-12T10:48:04Zby Kaesler, Clemens. author.<br/><a href="https://doi.org/10.1007/978-3-658-02011-8">https://doi.org/10.1007/978-3-658-02011-8</a><br/>Format: Electronic Resources<br/>Informationelle Selbstbestimmung im Web 2.0 Chancen und Risiken sozialer Verschlagwortungssystemeent://SD_ILS/0/SD_ILS:1844322025-02-12T10:48:04Z2025-02-12T10:48:04Zby Doerfel, Stephan. author.<br/><a href="https://doi.org/10.1007/978-3-642-38056-3">https://doi.org/10.1007/978-3-642-38056-3</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1993302025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gantz, Stephen D.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496414">https://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Security and Privacy Preserving in Social Networksent://SD_ILS/0/SD_ILS:1769512025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format: Electronic Resources<br/>The Laws of Robots Crimes, Contracts, and Tortsent://SD_ILS/0/SD_ILS:1771022025-02-12T10:48:04Z2025-02-12T10:48:04Zby Pagallo, Ugo. author. (orcid)0000-0001-7981-8849<br/><a href="https://doi.org/10.1007/978-94-007-6564-1">https://doi.org/10.1007/978-94-007-6564-1</a><br/>Format: Electronic Resources<br/>Privacy and Data Protection Issues of Biometric Applications A Comparative Legal Analysisent://SD_ILS/0/SD_ILS:1770362025-02-12T10:48:04Z2025-02-12T10:48:04Zby Kindt, Els J. author.<br/><a href="https://doi.org/10.1007/978-94-007-7522-0">https://doi.org/10.1007/978-94-007-7522-0</a><br/>Format: Electronic Resources<br/>Privatheit im Internet Chancen wahrnehmen, Risiken einschätzen, Vertrauen gestaltenent://SD_ILS/0/SD_ILS:1780992025-02-12T10:48:04Z2025-02-12T10:48:04Zby acatech, . editor.<br/><a href="https://doi.org/10.1007/978-3-642-37980-2">https://doi.org/10.1007/978-3-642-37980-2</a><br/>Format: Electronic Resources<br/>Internationales Strafrecht im Cyberspace Strafrechtliche Analyse der Rechtslage in Deutschland, Russland und den USAent://SD_ILS/0/SD_ILS:1904302025-02-12T10:48:04Z2025-02-12T10:48:04Zby Paramonova, Svetlana. author.<br/><a href="https://doi.org/10.1007/978-3-658-04399-5">https://doi.org/10.1007/978-3-658-04399-5</a><br/>Format: Electronic Resources<br/>Auctions, Market Mechanisms and Their Applications Second International ICST Conference, AMMA 2011, New York, USA, August 22-23, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1428912025-02-12T10:48:04Z2025-02-12T10:48:04Zby Coles, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30913-7">https://doi.org/10.1007/978-3-642-30913-7</a><br/>Format: Electronic Resources<br/>Human ICT Implants: Technical, Legal and Ethical Considerationsent://SD_ILS/0/SD_ILS:1430002025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gasson, Mark N. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-870-5">https://doi.org/10.1007/978-90-6704-870-5</a><br/>Format: Electronic Resources<br/>Anonymizationent://SD_ILS/0/SD_ILS:1390182025-02-12T10:48:04Z2025-02-12T10:48:04Zby Weber, Rolf H. author.<br/><a href="https://doi.org/10.1007/978-1-4471-4066-5">https://doi.org/10.1007/978-1-4471-4066-5</a><br/>Format: Electronic Resources<br/>Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, Kristiansand, Norway, September 3-6, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1352782025-02-12T10:48:04Z2025-02-12T10:48:04Zby Scholl, Hans Jochen. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33489-4">https://doi.org/10.1007/978-3-642-33489-4</a><br/>Format: Electronic Resources<br/>Software Similarity and Classificationent://SD_ILS/0/SD_ILS:1693112025-02-12T10:48:04Z2025-02-12T10:48:04Zby Cesare, Silvio. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2909-7">https://doi.org/10.1007/978-1-4471-2909-7</a><br/>Format: Electronic Resources<br/>Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1735462025-02-12T10:48:04Z2025-02-12T10:48:04Zby Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedingsent://SD_ILS/0/SD_ILS:1737232025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30428-6">https://doi.org/10.1007/978-3-642-30428-6</a><br/>Format: Electronic Resources<br/>European Data Protection: In Good Health?ent://SD_ILS/0/SD_ILS:1744662025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gutwirth, Serge. editor.<br/><a href="https://doi.org/10.1007/978-94-007-2903-2">https://doi.org/10.1007/978-94-007-2903-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1631632025-02-12T10:48:04Z2025-02-12T10:48:04Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format: Electronic Resources<br/>Internet Privacy Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysisent://SD_ILS/0/SD_ILS:1819802025-02-12T10:48:04Z2025-02-12T10:48:04Zby Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-642-31943-3">https://doi.org/10.1007/978-3-642-31943-3</a><br/>Format: Electronic Resources<br/>Digital forensics for legal professionals : understanding digital evidence from the warrant to the courtrooment://SD_ILS/0/SD_ILS:1986612025-02-12T10:48:04Z2025-02-12T10:48:04Zby Daniel, Larry (Larry E.)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496438">https://www.sciencedirect.com/science/book/9781597496438</a><br/>Format: Electronic Resources<br/>Google and the Law Empirical Approaches to Legal Aspects of Knowledge-Economy Business Modelsent://SD_ILS/0/SD_ILS:1761042025-02-12T10:48:04Z2025-02-12T10:48:04Zby Lopez-Tarruella, Aurelio. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-846-0">https://doi.org/10.1007/978-90-6704-846-0</a><br/>Format: Electronic Resources<br/>Second Generation Biometrics: The Ethical, Legal and Social Contextent://SD_ILS/0/SD_ILS:1770712025-02-12T10:48:04Z2025-02-12T10:48:04Zby Mordini, Emilio. editor.<br/><a href="https://doi.org/10.1007/978-94-007-3892-8">https://doi.org/10.1007/978-94-007-3892-8</a><br/>Format: Electronic Resources<br/>Computer- und Internetstrafrecht Ein Grundrissent://SD_ILS/0/SD_ILS:1782352025-02-12T10:48:04Z2025-02-12T10:48:04Zby Hilgendorf, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-642-16885-7">https://doi.org/10.1007/978-3-642-16885-7</a><br/>Format: Electronic Resources<br/>Recht ex machina Formalisierung des Rechts im Internet der Diensteent://SD_ILS/0/SD_ILS:1862332025-02-12T10:48:04Z2025-02-12T10:48:04Zby Raabe, Oliver. author.<br/><a href="https://doi.org/10.1007/978-3-642-17671-5">https://doi.org/10.1007/978-3-642-17671-5</a><br/>Format: Electronic Resources<br/>Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerceent://SD_ILS/0/SD_ILS:1871002025-02-12T10:48:04Z2025-02-12T10:48:04Zby Borges, Georg. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30102-5">https://doi.org/10.1007/978-3-642-30102-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1441792025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22039-5">https://doi.org/10.1007/978-3-642-22039-5</a><br/>Format: Electronic Resources<br/>Forensics in Telecommunications, Information and Multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1395592025-02-12T10:48:04Z2025-02-12T10:48:04Zby Lai, Xuejia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23602-0">https://doi.org/10.1007/978-3-642-23602-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1426812025-02-12T10:48:04Z2025-02-12T10:48:04Zby Baggili, Ibrahim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19513-6">https://doi.org/10.1007/978-3-642-19513-6</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for Lifeent://SD_ILS/0/SD_ILS:1612342025-02-12T10:48:04Z2025-02-12T10:48:04Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20317-6">https://doi.org/10.1007/978-3-642-20317-6</a><br/>Format: Electronic Resources<br/>Legislative XML for the Semantic Web Principles, Models, Standards for Document Managementent://SD_ILS/0/SD_ILS:1614102025-02-12T10:48:04Z2025-02-12T10:48:04Zby Sartor, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-94-007-1887-6">https://doi.org/10.1007/978-94-007-1887-6</a><br/>Format: Electronic Resources<br/>Electronic Government 10th International Conference, EGOV 2011, Delft, The Netherlands, August 29 -- September 1, 2011, Proceedingsent://SD_ILS/0/SD_ILS:1695202025-02-12T10:48:04Z2025-02-12T10:48:04Zby Janssen, Marijn. editor. (orcid)0000-0001-6211-8790<br/><a href="https://doi.org/10.1007/978-3-642-22878-0">https://doi.org/10.1007/978-3-642-22878-0</a><br/>Format: Electronic Resources<br/>Analysis of Social Media and Ubiquitous Data International Workshops MSM 2010, Toronto, Canada, June 13, 2010, and MUSE 2010, Barcelona, Spain, September 20, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1708682025-02-12T10:48:04Z2025-02-12T10:48:04Zby Atzmueller, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23599-3">https://doi.org/10.1007/978-3-642-23599-3</a><br/>Format: Electronic Resources<br/>Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1717722025-02-12T10:48:04Z2025-02-12T10:48:04Zby Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-22137-8">https://doi.org/10.1007/978-3-642-22137-8</a><br/>Format: Electronic Resources<br/>Innovating Government Normative, Policy and Technological Dimensions of Modern Governmentent://SD_ILS/0/SD_ILS:1743262025-02-12T10:48:04Z2025-02-12T10:48:04Zby van der Hof, Simone. editor.<br/><a href="https://doi.org/10.1007/978-90-6704-731-9">https://doi.org/10.1007/978-90-6704-731-9</a><br/>Format: Electronic Resources<br/>Financial Identity Theft Context, Challenges and Countermeasuresent://SD_ILS/0/SD_ILS:1645602025-02-12T10:48:04Z2025-02-12T10:48:04Zby van der Meulen, Nicole S. author.<br/><a href="https://doi.org/10.1007/978-90-6704-814-9">https://doi.org/10.1007/978-90-6704-814-9</a><br/>Format: Electronic Resources<br/>User Generated Content Urheberrechtliche Zulässigkeit nutzergenerierter Medieninhalteent://SD_ILS/0/SD_ILS:1827662025-02-12T10:48:04Z2025-02-12T10:48:04Zby Bauer, Christian Alexander. author.<br/><a href="https://doi.org/10.1007/978-3-642-20068-7">https://doi.org/10.1007/978-3-642-20068-7</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics VII 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1773142025-02-12T10:48:04Z2025-02-12T10:48:04Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-24212-0">https://doi.org/10.1007/978-3-642-24212-0</a><br/>Format: Electronic Resources<br/>Identitätsdiebstahl und Identitätsmissbrauch im Internet Rechtliche und technische Aspekteent://SD_ILS/0/SD_ILS:1786092025-02-12T10:48:04Z2025-02-12T10:48:04Zby Borges, Georg. author.<br/><a href="https://doi.org/10.1007/978-3-642-15833-9">https://doi.org/10.1007/978-3-642-15833-9</a><br/>Format: Electronic Resources<br/>Handbuch des Technikrechts Allgemeine Grundlagen Umweltrecht- Gentechnikrecht - Energierecht Telekommunikations- und Medienrecht Patentrecht - Computerrechtent://SD_ILS/0/SD_ILS:1909602025-02-12T10:48:04Z2025-02-12T10:48:04Zby Schulte, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11884-5">https://doi.org/10.1007/978-3-642-11884-5</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1471262025-02-12T10:48:04Z2025-02-12T10:48:04Zby Goel, Sanjay. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11534-9">https://doi.org/10.1007/978-3-642-11534-9</a><br/>Format: Electronic Resources<br/>The Global Cybercrime Industry Economic, Institutional and Strategic Perspectivesent://SD_ILS/0/SD_ILS:1472382025-02-12T10:48:04Z2025-02-12T10:48:04Zby Kshetri, Nir. author.<br/><a href="https://doi.org/10.1007/978-3-642-11522-6">https://doi.org/10.1007/978-3-642-11522-6</a><br/>Format: Electronic Resources<br/>I contenuti digitali tecnologie, diritti e libertàent://SD_ILS/0/SD_ILS:1352232025-02-12T10:48:04Z2025-02-12T10:48:04Zby Lucchi, Nicola. author.<br/><a href="https://doi.org/10.1007/978-88-470-1399-5">https://doi.org/10.1007/978-88-470-1399-5</a><br/>Format: Electronic Resources<br/>Shaping Internet Governance: Regulatory Challengesent://SD_ILS/0/SD_ILS:1685922025-02-12T10:48:04Z2025-02-12T10:48:04Zby Weber, Rolf H. author.<br/><a href="https://doi.org/10.1007/978-3-642-04620-9">https://doi.org/10.1007/978-3-642-04620-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1700482025-02-12T10:48:04Z2025-02-12T10:48:04Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11207-2">https://doi.org/10.1007/978-3-642-11207-2</a><br/>Format: Electronic Resources<br/>Patent Law for Computer Scientists Steps to Protect Computer-Implemented Inventionsent://SD_ILS/0/SD_ILS:1628102025-02-12T10:48:04Z2025-02-12T10:48:04Zby Closa, Daniel. author.<br/><a href="https://doi.org/10.1007/978-3-642-05078-7">https://doi.org/10.1007/978-3-642-05078-7</a><br/>Format: Electronic Resources<br/>Internet of Things Legal Perspectivesent://SD_ILS/0/SD_ILS:1667082025-02-12T10:48:04Z2025-02-12T10:48:04Zby Weber, Rolf H. author.<br/><a href="https://doi.org/10.1007/978-3-642-11710-7">https://doi.org/10.1007/978-3-642-11710-7</a><br/>Format: Electronic Resources<br/>Nutzergenerierte Inhalte als Gegenstand des Privatrechts Aktuelle Probleme des Web 2.0ent://SD_ILS/0/SD_ILS:1848172025-02-12T10:48:04Z2025-02-12T10:48:04Zby Große Ruse-Khan, Henning. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12411-2">https://doi.org/10.1007/978-3-642-12411-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1761372025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chow, Kam-Pui. editor.<br/><a href="https://doi.org/10.1007/978-3-642-15506-2">https://doi.org/10.1007/978-3-642-15506-2</a><br/>Format: Electronic Resources<br/>Sicherheitsforschung Chancen und Perspektivenent://SD_ILS/0/SD_ILS:1895422025-02-12T10:48:04Z2025-02-12T10:48:04Zby Bach, Friedrich-Wilhelm. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04981-1">https://doi.org/10.1007/978-3-642-04981-1</a><br/>Format: Electronic Resources<br/>Privacy in Location-Based Applications Research Issues and Emerging Trendsent://SD_ILS/0/SD_ILS:1478882025-02-12T10:48:04Z2025-02-12T10:48:04Zby Bettini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03511-1">https://doi.org/10.1007/978-3-642-03511-1</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1429272025-02-12T10:48:04Z2025-02-12T10:48:04Zby Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01718-6">https://doi.org/10.1007/978-3-642-01718-6</a><br/>Format: Electronic Resources<br/>Electronic Government 8th International Conference, EGOV 2009, Linz, Austria, August 31 - September 3, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1438572025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03516-6">https://doi.org/10.1007/978-3-642-03516-6</a><br/>Format: Electronic Resources<br/>The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1443532025-02-12T10:48:04Z2025-02-12T10:48:04Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03315-5">https://doi.org/10.1007/978-3-642-03315-5</a><br/>Format: Electronic Resources<br/>International Safeguards and Satellite Imagery Key Features of the Nuclear Fuel Cycle and Computer-Based Analysisent://SD_ILS/0/SD_ILS:1444482025-02-12T10:48:04Z2025-02-12T10:48:04Zby Jasani, Bhupendra. editor.<br/><a href="https://doi.org/10.1007/978-3-540-79132-4">https://doi.org/10.1007/978-3-540-79132-4</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1388592025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01393-5">https://doi.org/10.1007/978-3-642-01393-5</a><br/>Format: Electronic Resources<br/>Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1393942025-02-12T10:48:04Z2025-02-12T10:48:04Zby Sorell, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02312-5">https://doi.org/10.1007/978-3-642-02312-5</a><br/>Format: Electronic Resources<br/>Electronic Participation First International Conference, ePart 2009 Linz, Austria, August 31-September 4, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1420412025-02-12T10:48:04Z2025-02-12T10:48:04Zby Macintosh, Ann. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03781-8">https://doi.org/10.1007/978-3-642-03781-8</a><br/>Format: Electronic Resources<br/>Business Information Systems Workshops BIS 2009 International Workshops, Poznan, Poland, April 27-29, 2009, Revised Papersent://SD_ILS/0/SD_ILS:1621912025-02-12T10:48:04Z2025-02-12T10:48:04Zby Abramowicz, Witold. editor. (orcid)0000-0001-5464-9698<br/><a href="https://doi.org/10.1007/978-3-642-03424-4">https://doi.org/10.1007/978-3-642-03424-4</a><br/>Format: Electronic Resources<br/>Internet Policy and Economics Challenges and Perspectivesent://SD_ILS/0/SD_ILS:1379322025-02-12T10:48:04Z2025-02-12T10:48:04Zby Lehr, William H. editor.<br/><a href="https://doi.org/10.1007/b104899">https://doi.org/10.1007/b104899</a><br/>Format: Electronic Resources<br/>Elektronik haberleşme alanında kişisel verilerin özel hukuk hükümlerine göre korunmasıent://SD_ILS/0/SD_ILS:951002025-02-12T10:48:04Z2025-02-12T10:48:04Zby Özdemir, Hayrunnisa<br/><a href="https://www.turcademy.com/tr/kitap/kisisel-verilerin-ozel-hukuk-hukumlerine-gore-korunmasi-9789750210778">https://www.turcademy.com/tr/kitap/kisisel-verilerin-ozel-hukuk-hukumlerine-gore-korunmasi-9789750210778</a><br/>Format: Books<br/>Online Communities and Social Computing Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1711192025-02-12T10:48:04Z2025-02-12T10:48:04Zby Ozok, A. Ant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02774-1">https://doi.org/10.1007/978-3-642-02774-1</a><br/>Format: Electronic Resources<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1725692025-02-12T10:48:04Z2025-02-12T10:48:04Zby Gal, Cecilia S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10233-2">https://doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics V Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1745152025-02-12T10:48:04Z2025-02-12T10:48:04Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04155-6">https://doi.org/10.1007/978-3-642-04155-6</a><br/>Format: Electronic Resources<br/>Computational Forensics Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1750012025-02-12T10:48:04Z2025-02-12T10:48:04Zby Geradts, Zeno J. M. H. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03521-0">https://doi.org/10.1007/978-3-642-03521-0</a><br/>Format: Electronic Resources<br/>Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1769812025-02-12T10:48:04Z2025-02-12T10:48:04Zby Katzenbeisser, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04431-1">https://doi.org/10.1007/978-3-642-04431-1</a><br/>Format: Electronic Resources<br/>Privatsphäre durch die Delegation von Rechtenent://SD_ILS/0/SD_ILS:1801862025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wohlgemuth, Sven. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9308-6">https://doi.org/10.1007/978-3-8348-9308-6</a><br/>Format: Electronic Resources<br/>Die Beschlagnahme elektronisch gespeicherter Daten bei privaten Trägern von Berufsgeheimnissenent://SD_ILS/0/SD_ILS:1927222025-02-12T10:48:04Z2025-02-12T10:48:04Zby Korge, Tobias. author.<br/><a href="https://doi.org/10.1007/978-3-540-88749-2">https://doi.org/10.1007/978-3-540-88749-2</a><br/>Format: Electronic Resources<br/>Safeguards in a World of Ambient Intelligenceent://SD_ILS/0/SD_ILS:1555002025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wright, David. editor.<br/><a href="https://doi.org/10.1007/978-1-4020-6662-7">https://doi.org/10.1007/978-1-4020-6662-7</a><br/>Format: Electronic Resources<br/>Proceedings of the IFIP TC 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:1519422025-02-12T10:48:04Z2025-02-12T10:48:04Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09699-5">https://doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1405422025-02-12T10:48:04Z2025-02-12T10:48:04Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89900-6">https://doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norwayent://SD_ILS/0/SD_ILS:1360682025-02-12T10:48:04Z2025-02-12T10:48:04Zby Karabulut, Yücel. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09428-1">https://doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1729262025-02-12T10:48:04Z2025-02-12T10:48:04Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87471-3">https://doi.org/10.1007/978-3-540-87471-3</a><br/>Format: Electronic Resources<br/>Handbook of Digital and Multimedia Forensic Evidenceent://SD_ILS/0/SD_ILS:1739942025-02-12T10:48:04Z2025-02-12T10:48:04Zby Barbara, John J. editor.<br/><a href="https://doi.org/10.1007/978-1-59745-577-0">https://doi.org/10.1007/978-1-59745-577-0</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papersent://SD_ILS/0/SD_ILS:1758372025-02-12T10:48:04Z2025-02-12T10:48:04Zby Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78478-4">https://doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>EU Digital Copyright Law and the End-Userent://SD_ILS/0/SD_ILS:1635952025-02-12T10:48:04Z2025-02-12T10:48:04Zby Mazziotti, Giuseppe. author.<br/><a href="https://doi.org/10.1007/978-3-540-76985-0">https://doi.org/10.1007/978-3-540-76985-0</a><br/>Format: Electronic Resources<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:1761552025-02-12T10:48:04Z2025-02-12T10:48:04Zby Goodall, John R. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78243-8">https://doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Mobility, Data Mining and Privacy Geographic Knowledge Discoveryent://SD_ILS/0/SD_ILS:1767712025-02-12T10:48:04Z2025-02-12T10:48:04Zby Giannotti, Fosca. editor. (orcid)0000-0003-3099-3835<br/><a href="https://doi.org/10.1007/978-3-540-75177-9">https://doi.org/10.1007/978-3-540-75177-9</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Torino, Italy, August 31 - September 5, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1777202025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-540-85204-9">https://doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Recht für Ingenieure Zivilrecht, Öffentliches Recht, Europarechtent://SD_ILS/0/SD_ILS:1783302025-02-12T10:48:04Z2025-02-12T10:48:04Zby Frenz, Walter. author.<br/><a href="https://doi.org/10.1007/978-3-540-76354-3">https://doi.org/10.1007/978-3-540-76354-3</a><br/>Format: Electronic Resources<br/>Medienrecht und Medienmärkteent://SD_ILS/0/SD_ILS:1884552025-02-12T10:48:04Z2025-02-12T10:48:04Zby Fischer, Joerg K. author.<br/><a href="https://doi.org/10.1007/978-3-540-72222-9">https://doi.org/10.1007/978-3-540-72222-9</a><br/>Format: Electronic Resources<br/>Electronic Banking und Datenschutz Rechtsfragen und Praxisent://SD_ILS/0/SD_ILS:1892212025-02-12T10:48:04Z2025-02-12T10:48:04Zby Kahler, Thomas. author.<br/><a href="https://doi.org/10.1007/978-3-540-72224-3">https://doi.org/10.1007/978-3-540-72224-3</a><br/>Format: Electronic Resources<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1468512025-02-12T10:48:04Z2025-02-12T10:48:04Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-540-75670-5">https://doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1425412025-02-12T10:48:04Z2025-02-12T10:48:04Zby Yang, Christopher C. editor.<br/><a href="https://doi.org/10.1007/978-3-540-71549-8">https://doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Digital Decision Making Back to the Futureent://SD_ILS/0/SD_ILS:1602152025-02-12T10:48:04Z2025-02-12T10:48:04Zby Corrigan, Ray. author.<br/><a href="https://doi.org/10.1007/978-1-84628-673-5">https://doi.org/10.1007/978-1-84628-673-5</a><br/>Format: Electronic Resources<br/>Cyberlaw, security & privacyent://SD_ILS/0/SD_ILS:457632025-02-12T10:48:04Z2025-02-12T10:48:04Zby Cyberlaw, security & privacy : the second international conference on legal, security and privacy issues in information technology : (December 5-7, 2007 : China)<br/>Format: Books<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysisent://SD_ILS/0/SD_ILS:1684312025-02-12T10:48:04Z2025-02-12T10:48:04Zby Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/978-1-84628-750-3">https://doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1701562025-02-12T10:48:04Z2025-02-12T10:48:04Zby Schuler, Douglas. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73257-0">https://doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Electronic Goverment 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007, Proceedingsent://SD_ILS/0/SD_ILS:1724212025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74444-3">https://doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Praxis des IT-Rechts Praktische Rechtsfragen der IT-Sicherheit und Internetnutzungent://SD_ILS/0/SD_ILS:1780832025-02-12T10:48:04Z2025-02-12T10:48:04Zby Speichert, Horst. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9205-8">https://doi.org/10.1007/978-3-8348-9205-8</a><br/>Format: Electronic Resources<br/>Recordkeeping, Ethics and Law Regulatory Models, Participant Relationships and Rights and Responsibilities in the Online Worldent://SD_ILS/0/SD_ILS:1551042025-02-12T10:48:04Z2025-02-12T10:48:04Zby Iacovino, Livia. author.<br/><a href="https://doi.org/10.1007/1-4020-4714-2">https://doi.org/10.1007/1-4020-4714-2</a><br/>Format: Electronic Resources<br/>The Information Society: Emerging Landscapes IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005ent://SD_ILS/0/SD_ILS:1368732025-02-12T10:48:04Z2025-02-12T10:48:04Zby Zielinski, Chris. editor.<br/><a href="https://doi.org/10.1007/0-387-31168-8">https://doi.org/10.1007/0-387-31168-8</a><br/>Format: Electronic Resources<br/>Information Assurance Security in the Information Environmentent://SD_ILS/0/SD_ILS:1686692025-02-12T10:48:04Z2025-02-12T10:48:04Zby Blyth, Andrew. author.<br/><a href="https://doi.org/10.1007/1-84628-489-9">https://doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>EC2ND 2005 Proceedings of the First European Conference on Computer Network Defenceent://SD_ILS/0/SD_ILS:1689342025-02-12T10:48:04Z2025-02-12T10:48:04Zby Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/1-84628-352-3">https://doi.org/10.1007/1-84628-352-3</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1707632025-02-12T10:48:04Z2025-02-12T10:48:04Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/11930242">https://doi.org/10.1007/11930242</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.ent://SD_ILS/0/SD_ILS:1719132025-02-12T10:48:04Z2025-02-12T10:48:04Zby Mehrotra, Sharad. editor.<br/><a href="https://doi.org/10.1007/11760146">https://doi.org/10.1007/11760146</a><br/>Format: Electronic Resources<br/>Digital Rights Management Technologies, Issues, Challenges and Systemsent://SD_ILS/0/SD_ILS:1729782025-02-12T10:48:04Z2025-02-12T10:48:04Zby Safavi-Naini, Reihaneh. editor.<br/><a href="https://doi.org/10.1007/11787952">https://doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1747452025-02-12T10:48:04Z2025-02-12T10:48:04Zby Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/11734628">https://doi.org/10.1007/11734628</a><br/>Format: Electronic Resources<br/>Electronic Government 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedingsent://SD_ILS/0/SD_ILS:1757682025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/11823100">https://doi.org/10.1007/11823100</a><br/>Format: Electronic Resources<br/>Handbuch IT in der Verwaltungent://SD_ILS/0/SD_ILS:1847622025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wind, Martin. editor.<br/><a href="https://doi.org/10.1007/3-540-46272-4">https://doi.org/10.1007/3-540-46272-4</a><br/>Format: Electronic Resources<br/>Datenschutzrecht - Schnell erfasstent://SD_ILS/0/SD_ILS:1896292025-02-12T10:48:04Z2025-02-12T10:48:04Zby Moos, Flemming. author.<br/><a href="https://doi.org/10.1007/978-3-540-39092-3">https://doi.org/10.1007/978-3-540-39092-3</a><br/>Format: Electronic Resources<br/>Legal Programming Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyondent://SD_ILS/0/SD_ILS:1520672025-02-12T10:48:04Z2025-02-12T10:48:04Zby Subirana, Brian. author.<br/><a href="https://doi.org/10.1007/b101542">https://doi.org/10.1007/b101542</a><br/>Format: Electronic Resources<br/>Perspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbookent://SD_ILS/0/SD_ILS:1428642025-02-12T10:48:04Z2025-02-12T10:48:04Zby Berleur, Jacques. editor.<br/><a href="https://doi.org/10.1007/b135654">https://doi.org/10.1007/b135654</a><br/>Format: Electronic Resources<br/>E-Government: Towards Electronic Democracy International Conference, TCGOV 2005, Bolzano, Italy, March 2-4, 2005, Proceedingsent://SD_ILS/0/SD_ILS:1464242025-02-12T10:48:04Z2025-02-12T10:48:04Zby Böhlen, Michael. editor.<br/><a href="https://doi.org/10.1007/b106542">https://doi.org/10.1007/b106542</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedingsent://SD_ILS/0/SD_ILS:1422242025-02-12T10:48:04Z2025-02-12T10:48:04Zby Kantor, Paul. editor.<br/><a href="https://doi.org/10.1007/b136511">https://doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Virtual Organizations Systems and Practicesent://SD_ILS/0/SD_ILS:1361712025-02-12T10:48:04Z2025-02-12T10:48:04Zby Camarinha-Matos, Luis M. editor.<br/><a href="https://doi.org/10.1007/b102339">https://doi.org/10.1007/b102339</a><br/>Format: Electronic Resources<br/>Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedingsent://SD_ILS/0/SD_ILS:1700102025-02-12T10:48:04Z2025-02-12T10:48:04Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/11545156">https://doi.org/10.1007/11545156</a><br/>Format: Electronic Resources<br/>Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human-Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedingsent://SD_ILS/0/SD_ILS:1717942025-02-12T10:48:04Z2025-02-12T10:48:04Zby Shimojo, Shinji. editor.<br/><a href="https://doi.org/10.1007/11527725">https://doi.org/10.1007/11527725</a><br/>Format: Electronic Resources<br/>Computer- und Internetstrafrecht Ein Grundrissent://SD_ILS/0/SD_ILS:1807262025-02-12T10:48:04Z2025-02-12T10:48:04Zby Hilgendorf, Eric. author.<br/><a href="https://doi.org/10.1007/3-540-27641-6">https://doi.org/10.1007/3-540-27641-6</a><br/>Format: Electronic Resources<br/>