1
by Kiely
Published 2002
Subjects: '; ...Products liability -- Legal research -- United States...
2
Published 2014
Table of Contents: '; ... -- NATO’s Cyber Defense as Methodology for Smart Defense -- The Security Culture of a Global...
Get full text
3
Published 2015
Table of Contents: '; ... in the Defense of Marriage Act; Janice Schuetz -- II. Argument Types and Legal Interpretation -- 7. Anti...
Get full text
4
Subjects: '; ...Legal Aspects of Computing. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Get full text
5
by Martini, Steve
Published 2008
6
Published 2014
Table of Contents: '; ... of Wartime Collaborators -- The Defense in the Dock: Professional Purges of French Lawyers after the Second...
Get full text
7
Table of Contents: '; ...,” and “Exclusionary Abuses” -- Chapter 4: The Conduct-Coverage of, Tests of Legality Promulgated by, and Defenses (U...
Get full text
8
Published 2013
Table of Contents: '; ...Bee Device Verification for Securing Industrial Control and Building Automation Systems -- Defensive Rekeying...
Get full text
9
Subjects: '; ...Theories of Law, Philosophy of Law, Legal History. https://scigraph.springernature.com/ontologies...
Get full text
10
Published 2015
Subjects: '; ...Legal Aspects of Computing. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Get full text
11
Published 2020
Subjects: '; ...Legal Aspects of Computing. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Get full text
12
Published 2014
Subjects: '; ...Legal Aspects of Computing. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Get full text
13
Published 2018
Subjects: '; ...Legal Aspects of Computing. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Get full text
14
by Bielby, Philip., Bielby, Philip.
Published 2008
Subjects: '; ...Theories of Law, Philosophy of Law, Legal History. https://scigraph.springernature.com/ontologies...
Get full text
15
Published 2007
Table of Contents: '; ... in Search of Legitimacy: the Case of Wrongful Life -- The Autonomy of Defense and Defense Counsel -- Checks...
Get full text
16
Published 2018
Table of Contents: '; ... Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications...
Get full text
17
Published 2018
Table of Contents: '; ...Attack and defense -- Theory in security -- Web security and emerging technologies -- Systems...
Get full text
18
Published 2019
Table of Contents: '; ... -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL...
Get full text
19
Published 2007
Table of Contents: '; ... -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy...
Get full text
20
Published 2017
Subjects: '; ...Legal Aspects of Computing. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Get full text