|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Critical Infrastructure Protection VI
|
Jonathan Butts |
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking… |
OL19838658W |
|
Handbuch zum Internetrecht
|
Detlef Kröger |
Anwendbarkeit des Mediendienstestaatsvertrages oder handelt es sich um Rund funk mit der Folge der Anwendung der Rundfunkgesetzes der Länder? Der zweite Abschnitt behandelt den "Rechtsverkehr im Inte… |
OL19854721W |
|
Human Law and Computer Law: Comparative Perspectives
|
Mireille Hildebrandt |
The focus of this book is on the epistemological and hermeneutic implications of data science and artificial intelligence for democracy and the Rule of Law. How do the normative effects of automated … |
OL19856235W |
|
The Laws of Robots
|
Ugo Pagallo |
This book explores how the design, construction, and use of robotics technology may affect today’s legal systems and, more particularly, matters of responsibility and agency in criminal law, contract… |
OL19882312W |
|
Market Integration Through Data Protection
|
Mario Viola de Azevedo Cunha |
In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration … |
OL19885824W |
|
Open Source Software: Quality Verification
|
Etiel Petrinja |
This book constitutes the refereed proceedings of the 9th International IFIP WG 2.13 Conference on Open Source Systems, OSS 2013, held in Koper-Capodistria, Slovenia, in June 2013. The 18 revised ful… |
OL19892336W |
|
Security and Privacy in Biometrics
|
Patrizio Campisi |
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection. This important tex… |
OL19901283W |
|
Security Protocols XVII
|
Bruce Christianson |
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers pres… |
OL19901291W |