Works matching Computer security laws


Results: 133
    1
    2
    3

    CYBER!

    Published in:
    Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
    By:
    • Matwyshyn, Andrea M.
    Publication type:
    Article
    4
    5
    6
    7
    8

    Who's Ready for a J.D.?

    Published in:
    ISSA Journal, 2016, v. 14, n. 10, p. 7
    By:
    • Sabett, Randy V.
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16

    Simple (Cyber) Sabotage.

    Published in:
    Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 1, p. 12
    By:
    • Williams, Tina C.
    Publication type:
    Article
    17
    18

    Networking Security in Asia.

    Published in:
    Washington Quarterly, 2017, v. 40, n. 3, p. 45, doi. 10.1080/0163660X.2017.1370359
    By:
    • Fontaine, Richard
    Publication type:
    Article
    19
    20
    21
    22

    Inhalt.

    Published in:
    2019
    Publication type:
    Table of Contents
    23
    24
    25
    26

    RECENT DEVELOPMENTS IN CYBERSECURITY AND DATA PRIVACY.

    Published in:
    Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
    By:
    • Black, Kyle D.;
    • Alam, Christina B.;
    • Bucher, Steven M.;
    • Giannetti, Ashley J.;
    • Godfrey, Lauren D.;
    • Wear, Justin D.
    Publication type:
    Article
    27
    28
    29

    Rules on dual use tools.

    Published in:
    ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
    By:
    • Walker-Osborn, Charlotte
    Publication type:
    Article
    30

    Double-edged swords.

    Published in:
    ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
    By:
    • Fafinski, Stefan
    Publication type:
    Article
    31
    32

    Conundrum.

    Published in:
    Minnesota Law Review, 2011, v. 96, n. 2, p. 584
    By:
    • Bambauer, Derek E.
    Publication type:
    Article
    33

    A Few Things to Ponder.

    Published in:
    Government Technology, 2013, v. 26, n. 1, p. 7
    By:
    • Towns, Steve
    Publication type:
    Article
    34
    35

    Gambling on Gmail.

    Published in:
    Government Technology, 2009, v. 22, n. 12, p. 42
    By:
    • WILLIAMS, MATT
    Publication type:
    Article
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47

    Clear and Present Danger.

    Published in:
    ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
    By:
    • Walker-Osborn, Charlotte;
    • Khalid, Farhan
    Publication type:
    Article
    48

    To Serve and Protect.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
    By:
    • Walker-Osborn, Charlotte;
    • Harto, Nadia
    Publication type:
    Article
    49

    Data protection.

    Published in:
    ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
    Publication type:
    Article
    50

    CONGRESSIONAL UPDATE.

    Published in:
    Contract Management, 2015, v. 55, n. 10, p. 72
    By:
    • ABRAHAMS, JESSICA C.
    Publication type:
    Article