Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Presents 19 papers from the May 1994 symposium reflecting current research in the field. Topics covered include databases, cryptographic protocols, information flow, access control, and distributed systems. Includes information on ways to maintain the services of the Internet and its successors in the face of increased attacks. Lacks an index. Annotation copyright by Book News, Inc., Portland, OR.
Choose an application
Presents 19 papers from the May 1994 symposium reflecting current research in the field. Topics covered include databases, cryptographic protocols, information flow, access control, and distributed systems. Includes information on ways to maintain the services of the Internet and its successors in the face of increased attacks. Lacks an index. Annotation copyright by Book News, Inc., Portland, OR.
Choose an application
Choose an application
Information networks --- Data protection --- Information superhighway
Choose an application
Choose an application
Computer crimes --- Computers --- Data protection --- Law and legislation
Choose an application
Data protection --- Computer networks --- Electronic data processing --- Computers
Choose an application
681.3*H --- Data protection --- -Privacy, Right of --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Information systems --- Law and legislation --- 681.3*H Information systems --- Habeas data
Listing 1 - 10 of 18 | << page >> |
Sort by
|