|
|
|
|
LEADER |
03278nam a2200601 4500 |
001 |
978-3-030-02547-2 |
003 |
DE-He213 |
005 |
20191220131254.0 |
007 |
cr nn 008mamaa |
008 |
181229s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030025472
|9 978-3-030-02547-2
|
024 |
7 |
|
|a 10.1007/978-3-030-02547-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
072 |
|
7 |
|a UBJ
|2 thema
|
082 |
0 |
4 |
|a 004
|2 23
|
245 |
1 |
0 |
|a Privacy Technologies and Policy
|h [electronic resource] :
|b 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers /
|c edited by Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XVI, 205 p. 79 illus., 54 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11079
|
505 |
0 |
|
|a Technical analysis and techniques -- Privacy implementation -- Compliance -- Legal aspects.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
1 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Database Management.
|0 http://scigraph.springernature.com/things/product-market-codes/I18024
|
650 |
2 |
4 |
|a The Computing Profession.
|0 http://scigraph.springernature.com/things/product-market-codes/I24075
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|0 http://scigraph.springernature.com/things/product-market-codes/I13049
|
700 |
1 |
|
|a Medina, Manel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mitrakas, Andreas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Rannenberg, Kai.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schweighofer, Erich.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Tsouroulas, Nikolaos.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030025465
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030025489
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11079
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-02547-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|