Works matching IS 01791990 AND DT 2013 AND VI 29
1
- Computer und Recht, 2013, v. 29, p. 3, doi. 10.9785/ovs-cr-2013-3
- Article
2
- Computer und Recht, 2013, v. 29, p. 1, doi. 10.9785/ovs-cr-2013-masthead
- Article
3
- Computer und Recht, 2013, v. 29, n. 11, p. 689, doi. 10.9785/ovs-cr-2013-689
- Article
4
- Computer und Recht, 2013, v. 29, n. 12, p. 761, doi. 10.9785/ovs-cr-2013-761
- Article
5
- Computer und Recht, 2013, v. 29, n. 12, p. 765, doi. 10.9785/ovs-cr-2013-765
- Article
6
- Computer und Recht, 2013, v. 29, n. 12, p. 772, doi. 10.9785/ovs-cr-2013-772a
- Article
7
- Computer und Recht, 2013, v. 29, n. 12, p. 772, doi. 10.9785/ovs-cr-2013-772b
- Sassenberg, Thomas;
- Franke, Johannes
- Article
8
- Computer und Recht, 2013, v. 29, n. 12, p. 783, doi. 10.9785/ovs-cr-2013-783
- Alich, Stefan;
- Sagalov, Leonid
- Article
9
- Computer und Recht, 2013, v. 29, n. 12, p. 779, doi. 10.9785/ovs-cr-2013-779
- Article
10
- Computer und Recht, 2013, v. 29, n. 12, p. 789, doi. 10.9785/ovs-cr-2013-789
- Kremer, Sascha;
- Buchalik, Barbara
- Article
11
- Computer und Recht, 2013, v. 29, n. 12, p. 794, doi. 10.9785/ovs-cr-2013-794
- Article
12
- Computer und Recht, 2013, v. 29, n. 12, p. 818, doi. 10.9785/ovs-cr-2013-818
- Schmitz, Peter;
- Eckhardt, Jens
- Article
13
- Computer und Recht, 2013, v. 29, n. 12, p. 822, doi. 10.9785/ovs-cr-2013-822
- Article
14
- Computer und Recht, 2013, v. 29, n. 12, p. r121, doi. 10.9785/ovs-cr-2013-r121
- Article
15
- Computer und Recht, 2013, v. 29, n. 12, p. r123, doi. 10.9785/ovs-cr-2013-r123
- Article
16
- Computer und Recht, 2013, v. 29, n. 12, p. r127, doi. 10.9785/ovs-cr-2013-r127
- Article
17
- Computer und Recht, 2013, v. 29, p. 2, doi. 10.9785/ovs-cr-2013-2
- Article
18
- Computer und Recht, 2013, v. 29, n. 11, p. 690, doi. 10.9785/ovs-cr-2013-690
- Article
19
- Computer und Recht, 2013, v. 29, n. 11, p. 695, doi. 10.9785/ovs-cr-2013-695
- Article
20
- Computer und Recht, 2013, v. 29, n. 11, p. 702, doi. 10.9785/ovs-cr-2013-702
- Article
21
- Computer und Recht, 2013, v. 29, n. 11, p. 707, doi. 10.9785/ovs-cr-2013-707
- Article
22
- Computer und Recht, 2013, v. 29, n. 11, p. 715, doi. 10.9785/ovs-cr-2013-715
- Article
23
- Computer und Recht, 2013, v. 29, n. 11, p. 721, doi. 10.9785/ovs-cr-2013-721
- Article
24
- Computer und Recht, 2013, v. 29, n. 11, p. 728, doi. 10.9785/ovs-cr-2013-728
- Article
25
- Computer und Recht, 2013, v. 29, n. 11, p. 749, doi. 10.9785/ovs-cr-2013-749
- Article
26
- Computer und Recht, 2013, v. 29, n. 11, p. 755, doi. 10.9785/ovs-cr-2013-755
- Article
27
- Computer und Recht, 2013, v. 29, n. 11, p. r115, doi. 10.9785/ovs-cr-2013-r115
- Article
28
- Computer und Recht, 2013, v. 29, n. 11, p. r117, doi. 10.9785/ovs-cr-2013-r117
- Article
29
- Computer und Recht, 2013, v. 29, n. 10, p. 621, doi. 10.9785/ovs-cr-2013-621
- Strittmatter, Marc;
- Harnos, Rafael
- Article
30
- Computer und Recht, 2013, v. 29, n. 10, p. 628, doi. 10.9785/ovs-cr-2013-628
- Article
31
- Computer und Recht, 2013, v. 29, n. 10, p. 632, doi. 10.9785/ovs-cr-2013-632
- Article
32
- Computer und Recht, 2013, v. 29, n. 10, p. 643, doi. 10.9785/ovs-cr-2013-643
- Koenig, Christian;
- Meyer, Matti
- Article
33
- Computer und Recht, 2013, v. 29, n. 10, p. 649, doi. 10.9785/ovs-cr-2013-649
- Article
34
- Computer und Recht, 2013, v. 29, n. 10, p. 661, doi. 10.9785/ovs-cr-2013-661
- Kempermann, Philip;
- Pieper, Jan-Hendrik
- Article
35
- Computer und Recht, 2013, v. 29, n. 10, p. 666, doi. 10.9785/ovs-cr-2013-666
- Article
36
- Computer und Recht, 2013, v. 29, n. 10, p. 681, doi. 10.9785/ovs-cr-2013-681
- Lehmann, Michael;
- Giedke, Anna
- Article
37
- Computer und Recht, 2013, v. 29, n. 10, p. r103, doi. 10.9785/ovs-cr-2013-r103
- Article
38
- Computer und Recht, 2013, v. 29, n. 10, p. r107, doi. 10.9785/ovs-cr-2013-r107
- Article
39
- Computer und Recht, 2013, v. 29, n. 9, p. 553, doi. 10.9785/ovs-cr-2013-553
- Article
40
- Computer und Recht, 2013, v. 29, n. 9, p. 557, doi. 10.9785/ovs-cr-2013-557
- Article
41
- Computer und Recht, 2013, v. 29, n. 9, p. 565, doi. 10.9785/ovs-cr-2013-565
- Article
42
- Computer und Recht, 2013, v. 29, n. 9, p. 573, doi. 10.9785/ovs-cr-2013-573
- Article
43
- Computer und Recht, 2013, v. 29, n. 9, p. 586, doi. 10.9785/ovs-cr-2013-586
- Heinemeyer, Dennis;
- Nordmeyer, Arne
- Article
44
- Computer und Recht, 2013, v. 29, n. 9, p. 592, doi. 10.9785/ovs-cr-2013-592
- Article
45
- Computer und Recht, 2013, v. 29, n. 9, p. 608, doi. 10.9785/ovs-cr-2013-608
- Lehmann, Michael;
- Giedke, Anna
- Article
46
- Computer und Recht, 2013, v. 29, n. 9, p. 616, doi. 10.9785/ovs-cr-2013-616
- Article
47
- Computer und Recht, 2013, v. 29, n. 9, p. r97, doi. 10.9785/ovs-cr-2013-backmatter
- Article
48
- Computer und Recht, 2013, v. 29, n. 9, p. r91, doi. 10.9785/ovs-cr-2013-r91
- Article
49
- Computer und Recht, 2013, v. 29, n. 9, p. r95, doi. 10.9785/ovs-cr-2013-r95
- Article
50
- Computer und Recht, 2013, v. 29, n. 8, p. 485, doi. 10.9785/ovs-cr-2013-485
- Article