Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer networks -- Security measures
28 Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- Aspects of regulating freedom of expression on the Internet
- Beyond cybersecurity : protecting your digital business
- Computer network attack and international law
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cybersecurity and human rights in the age of cyberveillance
- Cybersecurity and human rights in the age of cyberveillance
- Cybersecurity for executives : a practical guide
- Cybersecurity law
- Cyberspace & international law on jurisdiction : possibilities of dividing cyberspace into jurisdictions with help of filters and firewall software
- Cyberterrorism : the use of the internet for terrorist purposes
- File-Sharing Programs and Peer-to-Peer Networks Privacy and Security Risks
- Getting the deal through : cybersecurity
- H.R. 3159, the "Government Network Security Act of 2003," : Fact Sheet
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994
- Managing cyber attacks in international law, business, and relations : in search of cyber peace
- Managing cyber attacks in international law, business, and relations : in search of cyber peace
- Online privacy, social networking, and crime victimization : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Eleventh Congress, second session, July 28, 2010
- Protecting networks with SATAN
- Protection and security on the information superhighway
- Rethinking public key infrastructures and digital certificates : building in privacy
- Securing correspondence : an attorney's guide to electronic communications
- Socioeconomic and legal implications of electronic intrusion
- The connected world : examining the Internet of Things : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 11, 2015
- Thinking security : stopping next year's hackers
- Trust in the network economy
- Understanding digital signatures : establishing trust over the Internet and other networks
- Virtual private networks
- Web security & commerce
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/qdAeOJotAFA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/qdAeOJotAFA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/qdAeOJotAFA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/qdAeOJotAFA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>