Works matching DE "COMPUTER security laws"
1
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- Article
2
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- Wood, Charles Cresson;
- Rogers Jr., William S.;
- Poore, Ralph Spencer
- Article
3
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- Article
4
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- Article
5
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- Sartor, Giovanni;
- Viola de Azevedo Cunha, Mario
- Article
6
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- Article
7
- Business Law Review (15337421), 2012, v. 45, p. 75
- Article
8
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 692, doi. 10.1093/jigpal/jzs027
- Amato, Flora;
- Casola, Valentina;
- Mazzocca, Nicola;
- Romano, Sara
- Article
9
- Chapman Law Review, 2016, v. 19, n. 2, p. 401
- Article
10
- Journal of Contemporary Legal Issues, 2010, v. 19, n. 1, p. 513
- Article
11
- Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 1, p. 12
- Article
12
- International Journal of Micrographics & Optical Technology, 2007, v. 25, n. 5, p. 7
- Article
13
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- Hajian, Sara;
- Domingo-Ferrer, Josep;
- Farràs, Oriol
- Article
14
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- Massey, Aaron K.;
- Otto, Paul N.;
- Hayward, Lauren J.;
- Antón, Annie I.
- Article
16
- DESIDOC Bulletin of Information Technology, 2007, v. 27, n. 6, p. 41
- Tan Kar Peng;
- Ramaiah, Chennupati K.
- Article
17
- International Journal of Information Security, 2017, v. 16, n. 6, p. 673, doi. 10.1007/s10207-016-0345-x
- Joh, HyunChul;
- Malaiya, Yashwant
- Article
18
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- Article
19
- Tort Trial & Insurance Practice Law Journal, 2020, v. 55, n. 2, p. 217
- Godfrey, Lauren D.;
- Horton, Matthew;
- Johnson, Ericka A.;
- Mooney, Joshua A.;
- Zimmermann, Michael C.
- Article
20
- Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
- Black, Kyle D.;
- Alam, Christina B.;
- Bucher, Steven M.;
- Giannetti, Ashley J.;
- Godfrey, Lauren D.;
- Wear, Justin D.
- Article
21
- Tort Trial & Insurance Practice Law Journal, 2018, v. 53, n. 2, p. 291
- Wear, Justin D.;
- Flowers, Robert;
- Black, Kyle D.;
- Godfrey, Lauren D.;
- Anderson, Roberta D.
- Article
22
- International Lawyer, 2018, v. 51, n. 3, p. 537
- Article
23
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- Article
24
- ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
- Article
25
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- Article
26
- Minnesota Law Review, 2011, v. 96, n. 2, p. 584
- Article
27
- Government Technology, 2013, v. 26, n. 1, p. 7
- Article
28
- Government Technology, 2011, v. 24, n. 8, p. 46
- Article
29
- Government Technology, 2009, v. 22, n. 12, p. 42
- Article
30
- Issues in Science & Technology, 2000, v. 17, n. 1, p. 29
- Article
31
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- Article
32
- Boston University Law Review, 2021, v. 101, n. 2, p. 761
- Article
33
- Boston University Law Review, 2012, v. 92, n. 5, p. 1663
- Article
34
- American University Law Review, 2013, v. 62, n. 5, p. 1145
- Article
35
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 103
- Article
36
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 87
- Article
37
- ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
- Walker-Osborn, Charlotte;
- Khalid, Farhan
- Article
38
- ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
- Walker-Osborn, Charlotte;
- Harto, Nadia
- Article
39
- ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
- Article
40
- Contract Management, 2015, v. 55, n. 10, p. 72
- Article
41
- Contract Management, 2012, p. 76
- Article
42
- International Review of Law, Computers & Technology, 2009, v. 23, n. 1/2, p. 5, doi. 10.1080/13600860902742505
- Article
43
- International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 251, doi. 10.1080/1360086042000223535
- Article
44
- International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 231, doi. 10.1080/1360086042000223526
- Asinari *, María Verónica Pérez
- Article
45
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- Article
46
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 329
- Article
47
- International Journal of Electronics & Telecommunications, 2020, v. 66, n. 2, p. 321, doi. 10.24425/ijet.2020.131881
- Article
48
- Diplomatic History, 2019, v. 43, n. 1, p. 157, doi. 10.1093/dh/dhy038
- Article
49
- Business Lawyer, 2009, v. 65, n. 1, p. 285
- Siegel, Ariane;
- Denny, William;
- Poff, Kristen W.;
- Larose, Cynthia;
- Hale, Robert;
- Hintze, Mike
- Article
50
- International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
- Article