Search Results for - Narrowed by: Computers -- Law and legislation. - Data protection. - Legal Aspects of Computing. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bLaw$002band$002blegislation.$002509Computers$002b--$002bLaw$002band$002blegislation.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Legal$002bAspects$002bof$002bComputing.$002509Legal$002bAspects$002bof$002bComputing.$0026ps$003d300? 2024-06-16T21:11:59Z Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084797 2024-06-16T21:11:59Z 2024-06-16T21:11:59Z by&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084401 2024-06-16T21:11:59Z 2024-06-16T21:11:59Z by&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-06-16T21:11:59Z 2024-06-16T21:11:59Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2024-06-16T21:11:59Z 2024-06-16T21:11:59Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:501518 2024-06-16T21:11:59Z 2024-06-16T21:11:59Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512931 2024-06-16T21:11:59Z 2024-06-16T21:11:59Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>