From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Transborder data flow: legal persons in privacy protection legislation., и . AFIPS National Computer Conference, том 49 из AFIPS Conference Proceedings, стр. 587-593. AFIPS Press, (1980)Copyright and Other Forms of Protection for Software.. COMPCON, стр. 212-217. IEEE Computer Society, (1984)Computers and the law issues of societal concern.. SIGCAS Comput. Soc., 11 (3): 40-41 (1981)Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry., , , и . Commun. ACM, 27 (4): 312-321 (1984)Protecting Intellectual Property Rights in Software.. TRI-Ada, стр. 410-421. ACM, (1993)Legal Aspects of Computer Security.. ACM Pacific, стр. 188-189. (1975)Women leading, , и . Stephen Green Pr, Lexington, Mass., (1988)Ethical and legal issues in computer science (Panel Discussion)., , , , и . SIGCSE, стр. 215. ACM, (1981)Protection of Databases in the International Telecommunications Environment.. IFIP Congress (2), том A-52 из IFIP Transactions, стр. 219-231. North-Holland, (1994)Privacy.. SIGUCCS, стр. 8. ACM, (1976)