Works matching DE "COMPUTER security laws"


Results: 88
    1
    2
    3
    4

    Who's Ready for a J.D.?

    Published in:
    ISSA Journal, 2016, v. 14, n. 10, p. 7
    By:
    • Sabett, Randy V.
    Publication type:
    Article
    5
    6
    7
    8
    9
    10
    11

    Simple (Cyber) Sabotage.

    Published in:
    Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 1, p. 12
    By:
    • Williams, Tina C.
    Publication type:
    Article
    12
    13
    14
    15

    Inhalt.

    Published in:
    2019
    Publication type:
    Table of Contents
    16
    17
    18
    19
    20

    RECENT DEVELOPMENTS IN CYBERSECURITY AND DATA PRIVACY.

    Published in:
    Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
    By:
    • Black, Kyle D.;
    • Alam, Christina B.;
    • Bucher, Steven M.;
    • Giannetti, Ashley J.;
    • Godfrey, Lauren D.;
    • Wear, Justin D.
    Publication type:
    Article
    21
    22
    23

    Rules on dual use tools.

    Published in:
    ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
    By:
    • Walker-Osborn, Charlotte
    Publication type:
    Article
    24

    Double-edged swords.

    Published in:
    ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
    By:
    • Fafinski, Stefan
    Publication type:
    Article
    25
    26

    Conundrum.

    Published in:
    Minnesota Law Review, 2011, v. 96, n. 2, p. 584
    By:
    • Bambauer, Derek E.
    Publication type:
    Article
    27

    A Few Things to Ponder.

    Published in:
    Government Technology, 2013, v. 26, n. 1, p. 7
    By:
    • Towns, Steve
    Publication type:
    Article
    28
    29

    Gambling on Gmail.

    Published in:
    Government Technology, 2009, v. 22, n. 12, p. 42
    By:
    • WILLIAMS, MATT
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36
    37

    Clear and Present Danger.

    Published in:
    ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
    By:
    • Walker-Osborn, Charlotte;
    • Khalid, Farhan
    Publication type:
    Article
    38

    To Serve and Protect.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
    By:
    • Walker-Osborn, Charlotte;
    • Harto, Nadia
    Publication type:
    Article
    39

    Data protection.

    Published in:
    ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
    Publication type:
    Article
    40

    CONGRESSIONAL UPDATE.

    Published in:
    Contract Management, 2015, v. 55, n. 10, p. 72
    By:
    • ABRAHAMS, JESSICA C.
    Publication type:
    Article
    41
    42
    43
    44
    45

    Breaching and Entering.

    Published in:
    Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
    By:
    • Din, Myra F.
    Publication type:
    Article
    46
    47
    48
    49
    50

    Anonymising Personal Data.

    Published in:
    International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
    By:
    • WALDEN, IAN
    Publication type:
    Article