Search Results for Computers -- Law and legislation. - Narrowed by: Computer crimes.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers$002b--$002bLaw$002band$002blegislation.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300?2024-10-04T09:46:25ZFundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:2249902024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279712024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282892024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890<br/><a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4277592024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288202024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Cybenko, George. editor. (orcid)0000-0001-7734-2912<br/><a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282622024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983<br/><a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279082024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>The Quest to Cyber Superiority Cybersecurity Regulations, Frameworks, and Strategies of Major Economiesent://SD_ILS/0/SD_ILS:181062024-10-04T09:46:25Z2024-10-04T09:46:25ZYazar Kshetri, Nir. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40554-4">http://dx.doi.org/10.1007/978-3-319-40554-4</a><br/>Format: Electronic Resources<br/>