Search Results for Computer security. - Narrowed by: TEDU library - Intellectual property -- Law and legislation.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Intellectual$002bproperty$002b--$002bLaw$002band$002blegislation.$002509Intellectual$002bproperty$002b--$002bLaw$002band$002blegislation.$0026ps$003d300?2024-07-05T03:23:48ZSelf- and Co-regulation in Cybercrime, Cybersecurity and National Securityent://SD_ILS/0/SD_ILS:225502024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:195462024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Electronic Identityent://SD_ILS/0/SD_ILS:195382024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Andrade, Norberto Nuno Gomes de. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6449-4">http://dx.doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>The Quest to Cyber Superiority Cybersecurity Regulations, Frameworks, and Strategies of Major Economiesent://SD_ILS/0/SD_ILS:181062024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Kshetri, Nir. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40554-4">http://dx.doi.org/10.1007/978-3-319-40554-4</a><br/>Format: Electronic Resources<br/>Reforming European Data Protection Lawent://SD_ILS/0/SD_ILS:254802024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format: Electronic Resources<br/>Attribute-based Credentials for Trust Identity in the Information Societyent://SD_ILS/0/SD_ILS:222422024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Rannenberg, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14439-9">http://dx.doi.org/10.1007/978-3-319-14439-9</a><br/>Format: Electronic Resources<br/>Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Centuryent://SD_ILS/0/SD_ILS:257322024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Klitou, Demetrius. author.<br/><a href="http://dx.doi.org/10.1007/978-94-6265-026-8">http://dx.doi.org/10.1007/978-94-6265-026-8</a><br/>Format: Electronic Resources<br/>Cybercrime, Digital Forensics and Jurisdictionent://SD_ILS/0/SD_ILS:223342024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Chawki, Mohamed. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15150-2">http://dx.doi.org/10.1007/978-3-319-15150-2</a><br/>Format: Electronic Resources<br/>Regulating eTechnologies in the European Union Normative Realities and Trendsent://SD_ILS/0/SD_ILS:211312024-07-05T03:23:48Z2024-07-05T03:23:48ZYazar Kerikmäe, Tanel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08117-5">http://dx.doi.org/10.1007/978-3-319-08117-5</a><br/>Format: Electronic Resources<br/>