Works matching DE "COMPUTER security laws"


Results: 88
    1
    2
    3

    Who's Ready for a J.D.?

    Published in:
    ISSA Journal, 2016, v. 14, n. 10, p. 7
    By:
    • Sabett, Randy V.
    Publication type:
    Article
    4
    5
    6

    Clear and Present Danger.

    Published in:
    ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
    By:
    • Walker-Osborn, Charlotte;
    • Khalid, Farhan
    Publication type:
    Article
    7

    To Serve and Protect.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
    By:
    • Walker-Osborn, Charlotte;
    • Harto, Nadia
    Publication type:
    Article
    8

    Data protection.

    Published in:
    ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
    Publication type:
    Article
    9

    Rules on dual use tools.

    Published in:
    ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
    By:
    • Walker-Osborn, Charlotte
    Publication type:
    Article
    10

    Double-edged swords.

    Published in:
    ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
    By:
    • Fafinski, Stefan
    Publication type:
    Article
    11
    12

    CYBER HARDER.

    Published in:
    Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
    By:
    • MATWYSHYN, ANDREA M.
    Publication type:
    Article
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24

    Inhalt.

    Published in:
    2019
    Publication type:
    Table of Contents
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34

    CONGRESSIONAL UPDATE.

    Published in:
    Contract Management, 2015, v. 55, n. 10, p. 72
    By:
    • ABRAHAMS, JESSICA C.
    Publication type:
    Article
    35
    36
    38
    39
    40
    41
    42
    43

    Breaching and Entering.

    Published in:
    Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
    By:
    • Din, Myra F.
    Publication type:
    Article
    44
    45
    46
    47

    Anonymising Personal Data.

    Published in:
    International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
    By:
    • WALDEN, IAN
    Publication type:
    Article
    48
    49
    50