Search Results for Computer security. - Narrowed by: TEDU library - Intellectual property -- Law and legislation. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Intellectual$002bproperty$002b--$002bLaw$002band$002blegislation.$002509Intellectual$002bproperty$002b--$002bLaw$002band$002blegislation.$0026ps$003d300? 2024-07-05T03:23:48Z Self- and Co-regulation in Cybercrime, Cybersecurity and National Security ent://SD_ILS/0/SD_ILS:22550 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:19546 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:19538 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Andrade, Norberto Nuno Gomes de. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6449-4">http://dx.doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/> The Quest to Cyber Superiority Cybersecurity Regulations, Frameworks, and Strategies of Major Economies ent://SD_ILS/0/SD_ILS:18106 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Kshetri, Nir. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40554-4">http://dx.doi.org/10.1007/978-3-319-40554-4</a><br/>Format:&#160;Electronic Resources<br/> Reforming European Data Protection Law ent://SD_ILS/0/SD_ILS:25480 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format:&#160;Electronic Resources<br/> Attribute-based Credentials for Trust Identity in the Information Society ent://SD_ILS/0/SD_ILS:22242 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century ent://SD_ILS/0/SD_ILS:25732 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Klitou, Demetrius. author.<br/><a href="http://dx.doi.org/10.1007/978-94-6265-026-8">http://dx.doi.org/10.1007/978-94-6265-026-8</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime, Digital Forensics and Jurisdiction ent://SD_ILS/0/SD_ILS:22334 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Chawki, Mohamed. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15150-2">http://dx.doi.org/10.1007/978-3-319-15150-2</a><br/>Format:&#160;Electronic Resources<br/> Regulating eTechnologies in the European Union Normative Realities and Trends ent://SD_ILS/0/SD_ILS:21131 2024-07-05T03:23:48Z 2024-07-05T03:23:48Z Yazar&#160;Kerikm&auml;e, Tanel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08117-5">http://dx.doi.org/10.1007/978-3-319-08117-5</a><br/>Format:&#160;Electronic Resources<br/>