Search Results for Law and legislation. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLaw$002band$002blegislation.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300?dt=list 2024-12-23T08:26:40Z Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:335299 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Chbeir, Richard. editor.&#160;Al Bouna, Bechara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335299.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Similarity and Classification ent://SD_ILS/0/SD_ILS:173499 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Cesare, Silvio. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-2909-7">http://dx.doi.org/10.1007/978-1-4471-2909-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197328 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Aschenbruck, Nils. editor.&#160;Martini, Peter. editor.&#160;Meier, Michael. editor.&#160;T&ouml;lle, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33161-9">http://dx.doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197638 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identit&auml;tsdiebstahl und Identit&auml;tsmissbrauch im Internet Rechtliche und technische Aspekte ent://SD_ILS/0/SD_ILS:193099 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Borges, Georg. author.&#160;Schwenk, J&ouml;rg. author.&#160;Stuckenberg, Carl-Friedrich. author.&#160;Wegener, Christoph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15833-9">http://dx.doi.org/10.1007/978-3-642-15833-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> I contenuti digitali tecnologie, diritti e libert&agrave; ent://SD_ILS/0/SD_ILS:204402 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Lucchi, Nicola. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1399-5">http://dx.doi.org/10.1007/978-88-470-1399-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effectiveness of personal data protection : automated processing of criminal justice management ent://SD_ILS/0/SD_ILS:135228 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Matjas, Tatjana.<br/>Preferred Shelf Number&#160;K3264.C65 M38 2009<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190588 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Cvr&#269;ek, Daniel. editor.&#160;&Scaron;venda, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191308 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Gal, Cecilia S. editor.&#160;Kantor, Paul B. editor.&#160;Lesk, Michael E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190946 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Katzenbeisser, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global privacy protection : the first generation ent://SD_ILS/0/SD_ILS:134923 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Rule, James B., 1943-&#160;Greenleaf, G. W. (Graham William)<br/>Preferred Shelf Number&#160;K3264.C65 G58 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:164638 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Karabulut, Y&uuml;cel. editor.&#160;Mitchell, John. editor.&#160;Herrmann, Peter. editor.&#160;Jensen, Christian Damsgaard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187473 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Susilo, Willy. editor.&#160;Liu, Joseph K. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital rights management : an introduction ent://SD_ILS/0/SD_ILS:365587 2024-12-23T08:26:40Z 2024-12-23T08:26:40Z Author&#160;Satish, D., 1977-<br/>Preferred Shelf Number&#160;KK2655.6 D54 2007<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/>