Search Results for Law. - Narrowed by: Electronic data processing-Management. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dLaw.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bdata$002bprocessing-Management.$002509Electronic$002bdata$002bprocessing-Management.$0026ps$003d300?dt=list 2025-01-30T17:52:47Z Semantic Web Technologies and Legal Scholarly Publishing ent://SD_ILS/0/SD_ILS:137058 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Peroni, Silvio. author.<br/><a href="https://doi.org/10.1007/978-3-319-04777-5">https://doi.org/10.1007/978-3-319-04777-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Digital Government Leading and Managing in the Digital Era ent://SD_ILS/0/SD_ILS:169283 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Veit, Daniel. author.<br/><a href="https://doi.org/10.1007/978-3-642-38511-7">https://doi.org/10.1007/978-3-642-38511-7</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Mobile Open Source Technologies 10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San Jos&eacute;, Costa Rica, May 6-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169022 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Corral, Luis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55128-4">https://doi.org/10.1007/978-3-642-55128-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176522 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:164480 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172499 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Quality Verification 9th IFIP WG 2.13 International Conference, OSS 2013, Koper-Capodistria, Slovenia, June 25-28, 2013, Proceedings ent://SD_ILS/0/SD_ILS:151558 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Petrinja, Etiel. editor.<br/><a href="https://doi.org/10.1007/978-3-642-38928-3">https://doi.org/10.1007/978-3-642-38928-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157897 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45330-4">https://doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/> Auditing and GRC Automation in SAP ent://SD_ILS/0/SD_ILS:166555 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Chuprunov, Maxim. author.<br/><a href="https://doi.org/10.1007/978-3-642-35302-4">https://doi.org/10.1007/978-3-642-35302-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings ent://SD_ILS/0/SD_ILS:173723 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30428-6">https://doi.org/10.1007/978-3-642-30428-6</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:163163 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/> Auctions, Market Mechanisms and Their Applications Second International ICST Conference, AMMA 2011, New York, USA, August 22-23, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142891 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Coles, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30913-7">https://doi.org/10.1007/978-3-642-30913-7</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, Kristiansand, Norway, September 3-6, 2012, Proceedings ent://SD_ILS/0/SD_ILS:135278 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Scholl, Hans Jochen. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33489-4">https://doi.org/10.1007/978-3-642-33489-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:171772 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-22137-8">https://doi.org/10.1007/978-3-642-22137-8</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 10th International Conference, EGOV 2011, Delft, The Netherlands, August 29 -- September 1, 2011, Proceedings ent://SD_ILS/0/SD_ILS:169520 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Janssen, Marijn. editor. (orcid)0000-0001-6211-8790<br/><a href="https://doi.org/10.1007/978-3-642-22878-0">https://doi.org/10.1007/978-3-642-22878-0</a><br/>Format:&#160;Electronic Resources<br/> Forensics in Telecommunications, Information and Multimedia Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:139559 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Lai, Xuejia. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23602-0">https://doi.org/10.1007/978-3-642-23602-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142681 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Baggili, Ibrahim. editor.<br/><a href="https://doi.org/10.1007/978-3-642-19513-6">https://doi.org/10.1007/978-3-642-19513-6</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:144179 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22039-5">https://doi.org/10.1007/978-3-642-22039-5</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings ent://SD_ILS/0/SD_ILS:171119 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Ozok, A. Ant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02774-1">https://doi.org/10.1007/978-3-642-02774-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Location-Based Applications Research Issues and Emerging Trends ent://SD_ILS/0/SD_ILS:147888 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Bettini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03511-1">https://doi.org/10.1007/978-3-642-03511-1</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 8th International Conference, EGOV 2009, Linz, Austria, August 31 - September 3, 2009, Proceedings ent://SD_ILS/0/SD_ILS:143857 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03516-6">https://doi.org/10.1007/978-3-642-03516-6</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the IFIP TC 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:151942 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09699-5">https://doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Torino, Italy, August 31 - September 5, 2008, Proceedings ent://SD_ILS/0/SD_ILS:177720 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-540-85204-9">https://doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis ent://SD_ILS/0/SD_ILS:168431 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/978-1-84628-750-3">https://doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Electronic Goverment 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007, Proceedings ent://SD_ILS/0/SD_ILS:172421 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-540-74444-3">https://doi.org/10.1007/978-3-540-74444-3</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings ent://SD_ILS/0/SD_ILS:170156 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Schuler, Douglas. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73257-0">https://doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Decision Making Back to the Future ent://SD_ILS/0/SD_ILS:160215 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Corrigan, Ray. author.<br/><a href="https://doi.org/10.1007/978-1-84628-673-5">https://doi.org/10.1007/978-1-84628-673-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Rights Management Technologies, Issues, Challenges and Systems ent://SD_ILS/0/SD_ILS:172978 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="https://doi.org/10.1007/11787952">https://doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings ent://SD_ILS/0/SD_ILS:174745 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/11734628">https://doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence ent://SD_ILS/0/SD_ILS:168934 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/1-84628-352-3">https://doi.org/10.1007/1-84628-352-3</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:168669 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Blyth, Andrew. author.<br/><a href="https://doi.org/10.1007/1-84628-489-9">https://doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings ent://SD_ILS/0/SD_ILS:175768 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/11823100">https://doi.org/10.1007/11823100</a><br/>Format:&#160;Electronic Resources<br/> Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human-Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings ent://SD_ILS/0/SD_ILS:171794 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Shimojo, Shinji. editor.<br/><a href="https://doi.org/10.1007/11527725">https://doi.org/10.1007/11527725</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings ent://SD_ILS/0/SD_ILS:170010 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/11545156">https://doi.org/10.1007/11545156</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings ent://SD_ILS/0/SD_ILS:142224 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Kantor, Paul. editor.<br/><a href="https://doi.org/10.1007/b136511">https://doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/> Perspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbook ent://SD_ILS/0/SD_ILS:142864 2025-01-30T17:52:47Z 2025-01-30T17:52:47Z by&#160;Berleur, Jacques. editor.<br/><a href="https://doi.org/10.1007/b135654">https://doi.org/10.1007/b135654</a><br/>Format:&#160;Electronic Resources<br/>