Search Results for Data protection. - Narrowed by: SpringerLink (Online service) - Electronic Library - Legal Aspects of Computing. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Legal$002bAspects$002bof$002bComputing.$002509Legal$002bAspects$002bof$002bComputing.$0026ps$003d300? 2024-09-01T21:07:51Z Market Integration Through Data Protection An Analysis of the Insurance and Financial Industries in the EU ent://SD_ILS/0/SD_ILS:336155 2024-09-01T21:07:51Z 2024-09-01T21:07:51Z Author&#160;Viola de Azevedo Cunha, Mario. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336155.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6085-1">http://dx.doi.org/10.1007/978-94-007-6085-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beyond Data Protection Strategic Case Studies and Practical Guidance ent://SD_ILS/0/SD_ILS:333660 2024-09-01T21:07:51Z 2024-09-01T21:07:51Z Author&#160;Ismail, Noriswadi. editor.&#160;Yong Cieh, Edwin Lee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333660.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33081-0">http://dx.doi.org/10.1007/978-3-642-33081-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Data Protection Issues of Biometric Applications A Comparative Legal Analysis ent://SD_ILS/0/SD_ILS:336365 2024-09-01T21:07:51Z 2024-09-01T21:07:51Z Author&#160;Kindt, Els J. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336365.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-7522-0">http://dx.doi.org/10.1007/978-94-007-7522-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-09-01T21:07:51Z 2024-09-01T21:07:51Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2024-09-01T21:07:51Z 2024-09-01T21:07:51Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>