Works matching DE "COMPUTER network security laws"
1
- Michigan Law Review, 2012, v. 111, n. 1, p. 1
- Article
2
- Vanderbilt Journal of Entertainment & Technology Law, 2012, v. 15, n. 1, p. 191
- Article
3
- IT: Information Technology, 2015, v. 57, n. 6, p. 357, doi. 10.1515/itit-2015-0014
- Article
4
- EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0057-4
- Sokol, Pavol;
- Míšek, Jakub;
- Husák, Martin
- Article
5
- Chinese Law & Government, 2016, v. 48, n. 1, p. 60, doi. 10.1080/00094609.2015.1048136
- Article
6
- Washington Quarterly, 2017, v. 40, n. 3, p. 45, doi. 10.1080/0163660X.2017.1370359
- Article
7
- Boston College International & Comparative Law Review, 2012, v. 35, n. 2, p. 511
- Article
8
- Boston College International & Comparative Law Review, 2012, v. 35, n. 2, p. 511
- Article