Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which the
Computer architecture. Operating systems --- Computer. Automation --- computerbeveiliging --- digitale video --- Computer security. --- Data protection. --- Digital watermarking. --- Computer security --- Digital watermarking --- Data protection --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Watermarking, Digital --- Image steganography --- Watermarks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Computer security --- Data protection --- 681.3*E3 --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Générales ou ponctuelles, les questions posées par l'usage de l'Internet en Europe sont nombreuses et interdépendantes. Chaque question a en effet son importance, que l'on s'interroge sur le choix des instruments propres à permettre le développement du commerce électronique, sur la façon de sanctionner les usages déloyaux des noms de domaines, d'assurer la protection des données personnelles des internautes ou encore de traiter le problème de la responsabilité des intermédiaires techniques. Tout en analysant les réponses apportées par le droit positif et celles proposées dans les textes en préparation, les auteurs de cet ouvrage ont souhaité inscrire leur réflexion dans un cadre plus large afin de mettre en évidence la spécificité de l'approche européenne qui se construit autour d'un objectif fondamental qui est l'équilibre entre une logique de marché et des préoccupations citoyennes.
Internet --- Electronic commerce --- Commerce électronique --- Law and legislation --- Droit --- 341.17 EU --- 621.39 INTERNET --- 681.3 INTERNET --- 621.39* --- Information society --- -Electronic commerce --- -Data protection --- -303.4833094 --- Ug3.f --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Sociology --- Europese Unie--vv {341.17 EC} vanaf 1995--EU --- 621.39* Internet --- 341.17 EU Europese Unie--vv {341.17 EC} vanaf 1995--EU --- Commerce électronique --- -Internet --- -Data protection -
Choose an application
002:62 --- 347.7 --- Data transmission systems --- -Internet --- Data protection --- -Computer networks --- -347.7 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cyberspace --- Data communication systems --- Transmission of data --- Information theory --- Telecommunication systems --- Informatietechnologie --- Handelsrecht --- Law and legislation --- Law and legislation. --- Distributed processing --- 347.7 Handelsrecht --- 002:62 Informatietechnologie --- -Law and legislation
Choose an application
Computer security --- Data protection --- 681.3*C20 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- Management --- Computer-communication networks: general: data communications, opensystems interconnection reference model (OSI), security and protection (e.g., firewalls) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- -Data protection --- -658.0558 --- 005.8 --- -Protection --- 6813*C20 --- Sécurité informatique --- Protection de l'information (Informatique) --- Handbooks, manuals, etc. --- Gestion --- Guides, manuels, etc.
Choose an application
Computer crimes --- -Computers --- -Data protection --- -AA / International- internationaal --- 347.78 --- 347.83 --- 347.440 --- P01 - Droit de l'informatique - Informaticarecht --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Law and legislation --- -Law and legislation --- -Auteursrecht --- Computer recht --- Contracten (algemeenheden) --- Law --- Computer. Automation --- -Law --- -Law and legislation -
Choose an application
Privacy - Gegevensverwerking - Wet verwerking persoonsgegevens (wet 08.12.1992) - Europees en internationaal recht privacy privacy w.08.12.92 wijziging door w.11.12.98 omzetting e.g - richtlijn 95 46 eg d.d. 24.10.95 k.b.13.02.2001 & algemene inleiding & basisbegrippen en definities & toepassingsgebied & algemene beginselen inzake kwaliteit en toelaatbaarheid van gegevensverwerking & de verwerking van bijzondere categorieen van persoonsgegevens & de rechten van de betrokkene & de verplichtingen inzake beveiliging en vertrouwelijkheid van gegevensverwerking & de aangifte & het grensoverschrijdend gegevensverkeer & de Commissie voor de bescherming van de persoonlijke levenssfeer & procedure voor de rechtbank van eerste aanleg & strafbepalingen & model(len) voor de rechtspraktijk - kennisgeving cfr. art.9 1 en art.9 2 w.08.12.92 - modellen m.b.t. de rechten van de betrokkene - overeenkomst tussen de verantwoordelijke voor de verwerking en de verwerker Dit boek levert praktische commentaar bij de Wet verwerking van persoonsgegevens zoals aangepast door de Wet van 11 december 1998 en uitgevoerd door het Koninklijk Besluit van 13 februari 2001, met modellen voor de rechtspraak. Het is bestemd voor advocaten, bedrijfsjuristen, juridisch adviseurs en al wie bij de verwerking van persoonsgegevens betrokken is. Het geeft aan welke elementen rekening moet worden gehouden bij de toepassing van deze wetgeveing. Men heeft oog voor de praktische moeilijkheden waar de toepassing van de wet soms toe leidt en er worden pragmatische oplossingen gesuggereerd. Het boek bevat een combinatie van de bestaande inzichten van de Commissie voor de bescherming van de persoonlijke levenssfeer, standpunten uit rechtsleer en rechtspraak en de nieuwe wetsbepalingen. De algemene beginselen en wetsbepalingen worden geïllustreerd aan de hand van praktische voorbeelden.
Private law --- Human rights --- Belgium --- Droit privé --- Privaatrecht --- Data protection --- Privacy, Right of --- Law and legislation --- 342.7 --- 342.721 --- wet --- personenrecht --- prive-leven --- europees gemeenschapsrecht --- belgie --- BE / Belgium - België - Belgique --- 343.45 --- V60 - Protection de la vie privée - Bescherming persoonlijke levenssfeer --- -Privacy, Right of --- -Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Grondwettelijke rechten en vrijheden. Fundamentele rechten --- Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen --- loi --- droit des personnes --- vie privee --- droit communautaire europeen --- belgique --- Onschendbaarheid van geheimen. Geheim persoonlijke levenssfeer, beroepsgeheim, bankgeheim. --- -Law and legislation --- 342.721 Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen --- 342.7 Grondwettelijke rechten en vrijheden. Fundamentele rechten --- -Grondwettelijke rechten en vrijheden. Fundamentele rechten --- -Data protection --- -Civil rights --- Invasion of privacy --- -342.721 Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen --- Onschendbaarheid van geheimen. Geheim persoonlijke levenssfeer, beroepsgeheim, bankgeheim --- Data protection - Law and legislation - Belgium --- Privacy, Right of - Belgium
Choose an application
Industrial and intellectual property --- Information user --- Electronic information resources --- Data protection --- Copyright --- Intellectual property --- Sources d'information électroniques --- Protection de l'information (Informatique) --- Droit d'auteur --- Propriété intellectuelle --- Law and legislation --- Droit --- Electronic information resources. --- Law and legislation. --- 002:62 --- 34:681.3 --- Copyright and electronic data processing --- -Data protection --- -Databases --- -Intellectual property --- -681.3*K51 --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Data banks --- Data bases --- Databanks --- Database systems --- Computer files --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Electronic data processing and copyright --- Copyright infringement --- Fair use (Copyright) --- Informatietechnologie --- Informaticarecht --- -Law and legislation --- -Software protection: copyrights; patents; proprietary rights; trade secrets (Legal aspects of computing) --- 681.3*K51 Software protection: copyrights; patents; proprietary rights; trade secrets (Legal aspects of computing) --- Software protection: copyrights; patents; proprietary rights; trade secrets (Legal aspects of computing) --- 34:681.3 Informaticarecht --- 002:62 Informatietechnologie --- Intellectual property. --- Sources d'information électroniques --- Propriété intellectuelle --- Copyright - Electronic information resources. --- Data protection - Law and legislation. --- -Copyright --- -Law and legislation -
Choose an application
654 --- 342.721 --- Data encryption (Computer science) --- -Data protection --- -Freedom of information --- -Information networks --- -Privacy, Right of --- -Telecommunication systems --- -342.721 --- Communication systems --- Communications systems --- Systems, Communication --- Electronic systems --- Telecommunication --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Automated information networks --- Networks, Information --- Information services --- Information storage and retrieval systems --- Freedom of information --- Information, Freedom of --- Liberty of information --- Right to know --- Freedom of speech --- Intellectual freedom --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Telecommunication and telecontrol (organization, services) --- Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen --- Government policy --- -Law and legislation --- -Security measures --- -Government policy --- Law and legislation --- -654 --- 342.721 Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen --- 654 Telecommunication and telecontrol (organization, services) --- Information networks --- Telecommunication systems --- Security measures
Choose an application
Medical telematics --- Data protection --- Telecommunication in medicine --- Computer Communication Networks. --- Computer Security. --- Telemedicine. --- Medical Records Systems, Computerized. --- -Medical telematics --- -Telecommunication in medicine --- -Telecare (Medicine) --- Telemedicine --- Medicine --- Clinical telematics --- Health telematics --- Telehealth --- Medical informatics --- Telematics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- Forms and Records Control --- Mobile Health --- eHealth --- mHealth --- Health, Mobile --- Telemetry --- Compromising of Data --- Computer Hackers --- Computer Worms --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Telecommunications --- Education, Distance --- Europe. --- Northern Europe --- Southern Europe --- Western Europe --- Cyber Security --- Cybersecurity --- Data Encryption --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Security, Cyber --- -Europe. --- Computer Communication Networks --- Computer Security --- Medical Records Systems, Computerized --- Telecare (Medicine) --- Europe --- Security measures --- Medical records --- Access control --- Tele-ICU --- Tele-Intensive Care --- Tele-Referral --- Virtual Medicine --- Medicine, Virtual --- Tele ICU --- Tele Intensive Care --- Tele Referral --- Tele-Referrals --- Medical telematics - Europe. --- Data protection - Europe. --- Telecommunication in medicine - Europe.
Listing 1 - 10 of 10 |
Sort by
|