Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Computer security --- Data protection --- Information technology --- Security measures --- Computer security. --- Data protection. --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- IT (Information technology) --- Electronic data processing --- Security systems --- Hacking --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Electronic data processing --- Computer security --- Computer security. --- Auditing --- Auditing. --- Auditing of computer systems --- Computer audits --- EDP auditing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Security measures --- Data protection --- Security systems --- Hacking --- Office practice --- Automation --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer Science
Choose an application
Computer. Automation --- Computer security --- Data transmission systems --- Sécurité informatique --- Données --- Periodicals --- Security measure --- Périodiques --- Transmission --- Sûreté --- Mesures --- Security measures --- Périodiques. --- Sécurité --- -Electronic data processing departments --- -005.805 --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic information resources --- -Electronic information resources --- E-journals --- Information Technology --- Mathematical Sciences --- General and Others --- Applied Mathematics --- Computer security. --- Security measures. --- Data communication systems --- Transmission of data --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Computer Science --- Periodicals.
Choose an application
The Computer Law and Security Report regularly covers: data protection and privacy; data and software protection; European community developments in IT, IP and telecoms law; IT contracts; Telecommunications law and online liability; Internet law and security policy; Electronic commerce; Internet fraud and misuse; Systems security and risk management.
Computers --- Computer security --- Software protection --- Data protection --- Law and legislation --- Ordinateurs --- Sécurité informatique --- Logiciels --- Protection de l'information (Informatique) --- Computer security. --- Droit --- Périodiques. --- Protection --- Law and legislation. --- Habeas data --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software protection --- Protection of software --- Security measures --- Copyright --- Privacy, Right of --- Security systems --- Hacking --- Electronic data processing --- Computer programs --- Access control --- Cyber security --- Cybersecurity --- Protection of computer systems --- Law, General & Comparative --- Periodicals. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators
Choose an application
Computer. Automation --- Computer crimes --- Computers --- Criminalité informatique --- Ordinateurs --- Periodicals --- Access control --- Périodiques --- Accès --- Contrôle --- Computer crimes. --- Access control. --- Computer security --- -658.47805 --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures --- E-journals --- Electronic information resources --- Business, Economy and Management --- Information Technology --- Law --- Accounting and Auditing --- Actuarial Science, Insurance and Risk Management --- E --- Internet --- Software Engineering --- Crime, Criminology and Law Enforcement --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Crime --- Privacy, Right of
Choose an application
Audit --- Computer. Automation --- Computer security --- Electronic data processing departments --- Sécurité informatique --- Centres de traitement de l'information --- Periodicals --- Security measures --- Périodiques --- Sécurité --- Mesures --- Sécurité informatique --- Périodiques. --- Sécurité --- -Electronic data processing departments --- -005.805 --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- -Security measures --- E-journals --- NL / Netherlands - Nederland - Pays Bas --- Electronic information resources --- -Electronic information resources --- Information Technology --- Mathematical Sciences --- Computer Security Confidentiality --- Information Science and Systems --- Applied Mathematics --- -E-journals --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- -Protection
Listing 1 - 6 of 6 |
Sort by
|