Search Results for law - Narrowed by: Data protection.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dlaw$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2025-02-07T06:53:20ZCyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:1614802025-02-07T06:53:20Z2025-02-07T06:53:20Zby Chen, Thomas M. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Frameworkent://SD_ILS/0/SD_ILS:1639772025-02-07T06:53:20Z2025-02-07T06:53:20Zby Ben Ayed, Ghazi. author.<br/><a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:1765222025-02-07T06:53:20Z2025-02-07T06:53:20Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Cybersecurity in Switzerlandent://SD_ILS/0/SD_ILS:1773302025-02-07T06:53:20Z2025-02-07T06:53:20Zby Dunn Cavelty, Myriam. author.<br/><a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1644802025-02-07T06:53:20Z2025-02-07T06:53:20Zby Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Electronic Identityent://SD_ILS/0/SD_ILS:1375462025-02-07T06:53:20Z2025-02-07T06:53:20Zby de Andrade, Norberto Nuno Gomes. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:1439282025-02-07T06:53:20Z2025-02-07T06:53:20Zby Stalla-Bourdillon, Sophie. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Cyber-Development, Cyber-Democracy and Cyber-Defense Challenges, Opportunities and Implications for Theory, Policy and Practiceent://SD_ILS/0/SD_ILS:1465732025-02-07T06:53:20Z2025-02-07T06:53:20Zby Carayannis, Elias G. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-1028-1">https://doi.org/10.1007/978-1-4939-1028-1</a><br/>Format: Electronic Resources<br/>Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papersent://SD_ILS/0/SD_ILS:1724992025-02-07T06:53:20Z2025-02-07T06:53:20Zby Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1578972025-02-07T06:53:20Z2025-02-07T06:53:20Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-45330-4">https://doi.org/10.1007/978-3-642-45330-4</a><br/>Format: Electronic Resources<br/>Security and Privacy Preserving in Social Networksent://SD_ILS/0/SD_ILS:1769512025-02-07T06:53:20Z2025-02-07T06:53:20Zby Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format: Electronic Resources<br/>Software Similarity and Classificationent://SD_ILS/0/SD_ILS:1693112025-02-07T06:53:20Z2025-02-07T06:53:20Zby Cesare, Silvio. author.<br/><a href="https://doi.org/10.1007/978-1-4471-2909-7">https://doi.org/10.1007/978-1-4471-2909-7</a><br/>Format: Electronic Resources<br/>Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1735462025-02-07T06:53:20Z2025-02-07T06:53:20Zby Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:1631632025-02-07T06:53:20Z2025-02-07T06:53:20Zby Butts, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-35764-0">https://doi.org/10.1007/978-3-642-35764-0</a><br/>Format: Electronic Resources<br/>Identitätsdiebstahl und Identitätsmissbrauch im Internet Rechtliche und technische Aspekteent://SD_ILS/0/SD_ILS:1786092025-02-07T06:53:20Z2025-02-07T06:53:20Zby Borges, Georg. author.<br/><a href="https://doi.org/10.1007/978-3-642-15833-9">https://doi.org/10.1007/978-3-642-15833-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1700482025-02-07T06:53:20Z2025-02-07T06:53:20Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-11207-2">https://doi.org/10.1007/978-3-642-11207-2</a><br/>Format: Electronic Resources<br/>I contenuti digitali tecnologie, diritti e libertàent://SD_ILS/0/SD_ILS:1352232025-02-07T06:53:20Z2025-02-07T06:53:20Zby Lucchi, Nicola. author.<br/><a href="https://doi.org/10.1007/978-88-470-1399-5">https://doi.org/10.1007/978-88-470-1399-5</a><br/>Format: Electronic Resources<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1725692025-02-07T06:53:20Z2025-02-07T06:53:20Zby Gal, Cecilia S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10233-2">https://doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics V Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1745152025-02-07T06:53:20Z2025-02-07T06:53:20Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04155-6">https://doi.org/10.1007/978-3-642-04155-6</a><br/>Format: Electronic Resources<br/>Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1769812025-02-07T06:53:20Z2025-02-07T06:53:20Zby Katzenbeisser, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04431-1">https://doi.org/10.1007/978-3-642-04431-1</a><br/>Format: Electronic Resources<br/>Privatsphäre durch die Delegation von Rechtenent://SD_ILS/0/SD_ILS:1801862025-02-07T06:53:20Z2025-02-07T06:53:20Zby Wohlgemuth, Sven. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9308-6">https://doi.org/10.1007/978-3-8348-9308-6</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1388592025-02-07T06:53:20Z2025-02-07T06:53:20Zby Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01393-5">https://doi.org/10.1007/978-3-642-01393-5</a><br/>Format: Electronic Resources<br/>Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authoritiesent://SD_ILS/0/SD_ILS:1426512025-02-07T06:53:20Z2025-02-07T06:53:20Zby Volkamer, Melanie. author. (orcid)0000-0003-2674-4043<br/><a href="https://doi.org/10.1007/978-3-642-01662-2">https://doi.org/10.1007/978-3-642-01662-2</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1429272025-02-07T06:53:20Z2025-02-07T06:53:20Zby Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01718-6">https://doi.org/10.1007/978-3-642-01718-6</a><br/>Format: Electronic Resources<br/>The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1443532025-02-07T06:53:20Z2025-02-07T06:53:20Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03315-5">https://doi.org/10.1007/978-3-642-03315-5</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedingsent://SD_ILS/0/SD_ILS:1729262025-02-07T06:53:20Z2025-02-07T06:53:20Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-540-87471-3">https://doi.org/10.1007/978-3-540-87471-3</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papersent://SD_ILS/0/SD_ILS:1758372025-02-07T06:53:20Z2025-02-07T06:53:20Zby Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78478-4">https://doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Proceedings of the IFIP TC 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:1519422025-02-07T06:53:20Z2025-02-07T06:53:20Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09699-5">https://doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norwayent://SD_ILS/0/SD_ILS:1360682025-02-07T06:53:20Z2025-02-07T06:53:20Zby Karabulut, Yücel. editor.<br/><a href="https://doi.org/10.1007/978-0-387-09428-1">https://doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>Praxis des IT-Rechts Praktische Rechtsfragen der IT-Sicherheit und Internetnutzungent://SD_ILS/0/SD_ILS:1780832025-02-07T06:53:20Z2025-02-07T06:53:20Zby Speichert, Horst. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9205-8">https://doi.org/10.1007/978-3-8348-9205-8</a><br/>Format: Electronic Resources<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1468512025-02-07T06:53:20Z2025-02-07T06:53:20Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-540-75670-5">https://doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>