Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Choose an application
Computers --- Liability (Law) --- Data protection
Choose an application
Computers --- Data protection --- Computer networks --- Electronic data processing
Choose an application
Computer networks --- Data protection --- Transborder data flow --- Government policy --- Congresses. --- Government policy --- Congresses. --- Government policy --- Congresses.
Choose an application
The Computer Law and Security Report regularly covers: data protection and privacy; data and software protection; European community developments in IT, IP and telecoms law; IT contracts; Telecommunications law and online liability; Internet law and security policy; Electronic commerce; Internet fraud and misuse; Systems security and risk management.
Computers --- Computer security --- Electronic commerce --- Data protection --- Law and legislation --- BA01933 --- #RBIB:TSCAT.DUMORTIER --- Periodicals --- Information Technology --- Law --- Computer Security Confidentiality --- General and Others --- Computer. Automation --- informatisering
Choose an application
Computer security --- Data protection --- AA / International- internationaal --- 343.530 --- 654 --- Computerfraude. Computerveiligheid. --- Informatieverwerking. Bureautica. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Computerfraude. Computerveiligheid --- Informatieverwerking. Bureautica --- Protection --- Security measures
Choose an application
The Computer Law and Security Report regularly covers: data protection and privacy; data and software protection; European community developments in IT, IP and telecoms law; IT contracts; Telecommunications law and online liability; Internet law and security policy; Electronic commerce; Internet fraud and misuse; Systems security and risk management.
Computers --- Computer security --- Software protection --- Data protection --- Law and legislation --- Ordinateurs --- Sécurité informatique --- Logiciels --- Protection de l'information (Informatique) --- Computer security. --- Droit --- Périodiques. --- Protection --- Law and legislation. --- Habeas data --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software protection --- Protection of software --- Security measures --- Copyright --- Privacy, Right of --- Security systems --- Hacking --- Electronic data processing --- Computer programs --- Access control --- Cyber security --- Cybersecurity --- Protection of computer systems --- Law, General & Comparative --- Periodicals. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators
Choose an application
Computer crimes --- Electronic data processing departments --- Security measures --- -Electronic data processing departments --- -681.3*K42 --- Computer centers --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computerwetenschap--?*K42 --- 681.3*K42 --- Computer department security measures --- Data protection --- Computer crimes - United States --- Electronic data processing departments - Security measures
Choose an application
681.3*H --- Electronic data processing departments --- -Computer security --- #KVIV --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer centers --- Information systems --- Security measures --- 681.3*H Information systems --- Computer security --- Cyber security --- Cybersecurity --- Protection of computer systems --- Computer department security measures --- Protection --- Computer security. --- BASIC (Computer program language) --- Infographie --- Electronic data processing departments - Security measures
Choose an application
Computers --- Electronic data processing departments --- Ordinateurs --- Informatique, Centres d' --- Access control --- Congresses --- Security measures --- Accès --- Contrôle --- Congrès --- Sûreté --- Mesures --- 681.3*K65 --- Computer security --- -Electronic data processing departments --- -681.3*D46 --- 681.3*K41 --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computerwetenschap--?*K65 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K41 --- Congresses. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3*D46 --- Security measures&delete&
Listing 1 - 10 of 11 | << page >> |
Sort by
|