Search Results for law - Narrowed by: Data protection. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dlaw$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2025-02-07T06:53:20Z Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:161480 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Chen, Thomas M. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:163977 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Ben Ayed, Ghazi. author.<br/><a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176522 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:177330 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Dunn Cavelty, Myriam. author.<br/><a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:164480 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:137546 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;de Andrade, Norberto Nuno Gomes. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:143928 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Stalla-Bourdillon, Sophie. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/> Cyber-Development, Cyber-Democracy and Cyber-Defense Challenges, Opportunities and Implications for Theory, Policy and Practice ent://SD_ILS/0/SD_ILS:146573 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Carayannis, Elias G. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-1028-1">https://doi.org/10.1007/978-1-4939-1028-1</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172499 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:157897 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45330-4">https://doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:176951 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/> Software Similarity and Classification ent://SD_ILS/0/SD_ILS:169311 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Cesare, Silvio. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2909-7">https://doi.org/10.1007/978-1-4471-2909-7</a><br/>Format:&#160;Electronic Resources<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:173546 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:163163 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/> Identit&auml;tsdiebstahl und Identit&auml;tsmissbrauch im Internet Rechtliche und technische Aspekte ent://SD_ILS/0/SD_ILS:178609 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Borges, Georg. author.<br/><a href="https://doi.org/10.1007/978-3-642-15833-9">https://doi.org/10.1007/978-3-642-15833-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170048 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11207-2">https://doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/> I contenuti digitali tecnologie, diritti e libert&agrave; ent://SD_ILS/0/SD_ILS:135223 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Lucchi, Nicola. author.<br/><a href="https://doi.org/10.1007/978-88-470-1399-5">https://doi.org/10.1007/978-88-470-1399-5</a><br/>Format:&#160;Electronic Resources<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172569 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Gal, Cecilia S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10233-2">https://doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics V Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:174515 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04155-6">https://doi.org/10.1007/978-3-642-04155-6</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:176981 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Katzenbeisser, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04431-1">https://doi.org/10.1007/978-3-642-04431-1</a><br/>Format:&#160;Electronic Resources<br/> Privatsph&auml;re durch die Delegation von Rechten ent://SD_ILS/0/SD_ILS:180186 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Wohlgemuth, Sven. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9308-6">https://doi.org/10.1007/978-3-8348-9308-6</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:138859 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01393-5">https://doi.org/10.1007/978-3-642-01393-5</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authorities ent://SD_ILS/0/SD_ILS:142651 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Volkamer, Melanie. author. (orcid)0000-0003-2674-4043<br/><a href="https://doi.org/10.1007/978-3-642-01662-2">https://doi.org/10.1007/978-3-642-01662-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142927 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01718-6">https://doi.org/10.1007/978-3-642-01718-6</a><br/>Format:&#160;Electronic Resources<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:144353 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Maty&aacute;&scaron;, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03315-5">https://doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings ent://SD_ILS/0/SD_ILS:172926 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87471-3">https://doi.org/10.1007/978-3-540-87471-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers ent://SD_ILS/0/SD_ILS:175837 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78478-4">https://doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the IFIP TC 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:151942 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09699-5">https://doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:136068 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09428-1">https://doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> Praxis des IT-Rechts Praktische Rechtsfragen der IT-Sicherheit und Internetnutzung ent://SD_ILS/0/SD_ILS:178083 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Speichert, Horst. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9205-8">https://doi.org/10.1007/978-3-8348-9205-8</a><br/>Format:&#160;Electronic Resources<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:146851 2025-02-07T06:53:20Z 2025-02-07T06:53:20Z by&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-540-75670-5">https://doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>