Listing 1 - 10 of 111 << page
of 12
>>
Sort by

Book
Bulletproof SSL and TLS
Author:
ISBN: 9781907117046 1907117040 Year: 2017 Publisher: London : Feisty Duck,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Chiffrierung. --- Datensicherung. --- SSL. --- TLS.


Book
Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssytemen
Author:
Year: 2005 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bekannte Techniken für die Verwaltung und Überprüfung von Zertifikaten wurden zur Unterstützung von PKIs entwickelt. Aufgrund verschiedener Defizite dieser Techniken bezüglich Performanz und Sicherheit wird ein eigener Ansatz vorgestellt. Dieser Ansatz greift auf Vorgängerarbeiten zurück, im Wesentlichen auf Arbeiten von Ralph Charles Merkle, Irene Gassko et. al und Ahto Buldas. Einen wichtigen Baustein des vorgestellten Ansatzes bildet die Datenstruktur mit der Bezeichnung Improved Certification Verification Tree (I-CVT). Diese ermöglicht die kosteneffiziente und sichere Verwaltung und Überprüfung von Attributszertifikaten und kann die Basis einer sogenannten Privilege Management Infrastructure bilden. Basierend auf der I-CVT-Technik können die mit Attributszertifikaten verbundenen Verwaltungskosten niedrig gehalten werden. Wichtiger noch, dass mit Hilfe von I-CVTs die Überprüfung sowohl einzelner als auch gleichzeitig mehrerer Attributszertifikate einer Zertifizierungsstelle effizient und sicher durchführbar ist. Anhand von I-CVTs lassen sich so genannte Vollständigkeitsbeweise generieren. Diese verhindern die unbemerkte Zurückhaltung von auf eine Anfrage passenden Attributszertifikaten durch die diese speichernde Datenbank. Angenommen wird dabei, dass der Anfragende die Anzahl jener Attributszertifikate im Voraus nicht kennt. Einen Spezialfall für Vollständigkeitsbeweise bilden Anfragen, welche höchstens einen Treffer haben können. In solchen Fällen können so genannte Existenz-Beweise beziehungsweise Nicht-Existenz-Beweise generiert und vom Anfragenden ausgewertet werden, je nach Erfolg der jeweiligen Suche. Die Möglichkeit, solche Beweise zu generieren macht den Einsatz von I-CVTs neben der gewünschten sicheren Zugriffskontrolle auch für zahlreiche andere Szenarien attraktiv, die auf Datenbankanfragen basieren. Aus Sicht der performanten Überprüfung während der Zugriffskontrolle haben Attributszertifikate, welche durch Delegierung entstanden, eine Sonderstellung. Bei der zertifikatsbasierten Rechtedelegierung entstehen so genannte Delegierungsnetzwerke, die in den einfachsten Fällen eine Delegierungskette (engl. Delegation Chain) bilden. Ein solches Netzwerk besteht aus Zertifikaten, die von verschiedenen Stellen ausgestellt wurden. Den vertrauten Ursprung solcher Netzwerke, falls es überhaupt einen gibt, während der Zugriffskontrolle zu finden, kann lange Wartezeiten im System verursachen. Ein Vorschlag von Tuomas Aura den hiermit verbundenen Aufwand zu reduzieren, war die Reduktion derartiger Netzwerke auf Attributszertifikate, welche direkt von vertrauten Instanzen ausgestellt werden. Dies hat eine wesentliche Vereinfachung der Ursprungsprüfung delegierter Berechtigungen zur Folge. Einen sicheren Dienst für diesen Zweck innerhalb einer PMI zu konstruieren wirft aber etliche Probleme auf, welche diskutiert werden. In dieser Arbeit wird deshalb neben anderen Konzepten die Technik der so genannten Offline-Delegierung vorgeschlagen. Sie bietet eine einfache Lösung des Problems, indem die gleiche Nutzfunktionalität - sprich die Weitergabe von Berechtigungen - ganz ohne das Entstehen von Delegierungsnetzwerken geschieht. Dies macht die Ursprungsprüfung der Delegierungen einfacher sowie eine nachträgliche Reduzierung von Delegierungsnetzwerken unnötig. Die kombinierte Verwendung von I-CVTs und der Offline-Delegierung bildet das theoretische Fundament eines prototypisch implementierten Systems mit der Kurzbezeichnung PAMINA (Privilege Administration and Management INfrAstructure). Die den jeweiligen Bedürfnissen anpassbare und erweiterbare Komponenten des Systems PAMINA Administration Server, Privilege Database und Certificate Verifier ermöglichen eine flexible Einführung in eine Betriebsumgebung. Die Tragfähigkeit von PAMINA wurde bei der Absicherung eines an der Universität Karlsruhe entwickelten internetbasierten Lernsystems mit der Bezeichnung ed.tec demonstriert.


Book
Information security and cryptology : ICISC 2008
Authors: ---
ISBN: 9783642007293 Year: 2009 Publisher: Berlin : Springer,


Book
Computer and information security handbook
Authors: ---
ISBN: 9780128039298 0128039299 0128038438 9780128038437 Year: 2017 Publisher: Cambridge, England : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions


Book
Verwerking van persoonsgegevens in België
Authors: --- ---
ISBN: 9782509017246 Year: 2013 Publisher: Brussel Academic and Scientific Publishers Politeia

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Status of persons --- Human rights --- Belgium --- #SBIB:35H24 --- Informatiemanagement bij de overheid --- BPB --- gegevensbescherming --- Belgique --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Bélgica --- Belgija --- Belgien --- Belgie --- Belgicko --- België --- Beļģija --- Белгија --- Belgio --- Белгия --- Belgia --- il-Belġju --- An Bheilg --- Βέλγιο --- Belgjika --- Belgia Kuningriik --- Beļģijas Karaliste --- Royaume de Belgique --- Belgian kuningaskunta --- Belgické kráľovstvo --- Koninkrijk België --- Belgijos Karalystė --- das Königreich Belgien --- Βασίλειο του Βελγίου --- Kingdom of Belgium --- Кралство Белгија --- Краљевина Белгија --- Belgické království --- Reino de Bélgica --- ir-Renju tal-Belġju --- Regatul Belgiei --- Kongeriget Belgien --- Кралство Белгия --- Mbretëria e Belgjikës --- Belga Királyság --- Królestwo Belgii --- Konungariket Belgien --- Reino da Bélgica --- Kraljevina Belgija --- Regno del Belgio --- Comité P


Book
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers
Authors: --- ---
ISBN: 9783540891734 3540890955 9783540890959 9786613437914 1283437910 3540891730 Year: 2008 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are organized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling.

Keywords

Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Logiciels --- Computer security --- Computers --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Information storage and retrieval systems --- Systèmes d'information --- Kritische Informationsinfrastruktur --- Computersicherheit --- Datensicherung --- Kryptoanalyse --- Risikoanalyse --- Computer communication systems. --- Computer security. --- Algorithms. --- User interfaces (Computer systems). --- Computers and civilization. --- User Interfaces and Human Computer Interaction. --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Software, Computer


Book
Wireless Algorithms, Systems, and Applications : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 364239700X 3642397018 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Keywords

Computer science. --- Computer Communication Networks. --- Computer system performance. --- Computer software. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Computer Science, general. --- Wireless communication systems --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Management --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Software, Computer --- Informatics --- Computer communication systems. --- Computer system failures. --- Algorithms. --- Datensicherung. --- Datenverwaltung. --- Drahtloses Sensorsystem. --- Funknetz. --- Netzwerktopologie. --- Netzwerkverwaltung. --- Topologie --- Netzform --- Netzstruktur --- Netztopologie --- Netzarchitektur --- Rechnernetz --- Radio network --- Wireless network --- Drahtloses Telekommunikationsnetz --- Telekommunikationsnetz --- Wireless sensor network --- Drahtloses Sensornetz --- Sensorsystem --- Datenmanagement --- Dateiverwaltung --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Netzwerkmanagement --- Network management --- Netzmanagement --- Telecommunication systems --- Netzwerk --- Datenverarbeitung --- Science --- Computer systems --- Application software. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Failures --- Distributed processing --- Foundations --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.


Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
Authors: --- --- ---
ISBN: 3642392342 3642392350 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Keywords

Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing


Book
Le RGPD Face Aux défis de l'intelligence Artificielle.
Author:
ISSN: 22945539 ISBN: 9782807924147 280792414X 2807924530 Year: 2021 Volume: 48 Publisher: Namur : Larcier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

L’intelligence artificielle est sans doute l’innovation la plus radicale de transformation de nos sociétés : elle envahit nos vies et modèle nos décisions tant d’entreprises, de citoyens, que d’autorités publiques. Cette innovation est largement positive mais représente également un risque pour chacun de nous d’être épié, manipulé et réduit à nos données. Face à l’enjeu que représente l’IA pour notre futur, l’UE a récemment (19 février 2020) affirmé la nécessité d’une troisième voie, entre celles chinoise et américaine, en souhaitant que les outils d’IA soient dignes de confiance. Dans cette optique, la réaffirmation des libertés individuelles et en particulier la mise en valeur du RGPD au service de ces valeurs est au coeur de la politique européenne. Notre propos s’inscrit dans ce contexte. Le RGPD est-il l’outil adéquat pour répondre aux défis de l’IA ? La Commission européenne s’interroge. Notre propos est d’analyser les défis que l’IA pose au règlement européen et de montrer les diverses lacunes mais également les mérites de cet outil. La dimension collective des risques engendrés par l’IA, l’absence de transparence des systèmes de machine learning, les difficultés de leur évaluation, … autant de questions soulevées si notre société et chacun de nous souhaitons retrouver la maîtrise de ce qui en définitive constitue un artifice de notre intelligence humaine

Keywords

European law --- Human rights --- Artificial intelligence. Robotics. Simulation. Graphics --- European Union --- Droit à la vie privée. --- Protection de l'information (informatique) --- Intelligence artificielle --- Informatique --- Droit des technologies de l'information et de la communication. --- Droit européen --- Droit. --- E-books --- BPB2007 --- protection des données --- STRADALEX --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- gegevensbescherming --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Respect de la vie privée (informatique) Bescherming van het privé-leven (informatica) --- données data --- Information technology --- Privacy, Right of --- Data protection --- Artificial intelligence --- Electronic data processing --- Droit à la vie privée --- Protection de l'information (Informatique) --- Law and legislation --- Droit --- Belgique --- protection des données


Book
Le sens des libertés économiques de circulation
Authors: --- --- --- ---
ISBN: 9782802765479 2802765477 Year: 2020 Publisher: Bruxelles Bruylant

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dans une période où les libertés économiques de circulation (droit économique, libre-échange, commerce international et libertés européennes de circulation) sont de plus en plus contestées, il importe de livrer une réflexion approfondie sur la capacité des disciplines (droit, sciences humaines et sociales, sciences dures) à questionner le sens de ces libertés. Différents savoirs interrogent ainsi la conception que leurs constructions et analyses portent sur ces libertés. Quelles sont les directions prises ? Quelles sont les finalités poursuivies ? Faut-il constater des points de rupture entre les ambitions initiales et les réalisations observables aujourd’hui ? Associant chercheurs confirmés et jeunes chercheurs dans un dialogue intergénérationnel, cet ouvrage revêt de manière originale un caractère pluridisciplinaire, international et comparé. Il place les dynamiques contemporaines du droit économique et des phénomènes de circulation dans une perspective permettant leur compréhension à travers des études organisées autour d’enjeux clairement identifiés. = At a time in which economic freedoms of movement (economic law, free trade, international trade and European freedoms of movement) are increasingly being challenged, it is crucial to explore in depth the capacity of disciplines (law, human and social sciences, hard sciences) to question the sense of these freedoms. Different forms of knowledge thus question the conception that their constructions and analyses relate to these freedoms. What directions are being taken? What are the objectives pursued? Are there any gaps between the initial ambitions and the achievements that can be observed today? Bringing together experienced researchers and young researchers in an intergenerational dialogue, this book is original and multidisciplinary, international and comparative in nature. It places the contemporary dynamics of economic law and flow phenomena in a perspective that allows their comprehension through studies organised around clearly identified issues.

Keywords

International law --- Economic law --- Droit international économique. --- Droit européen. --- Liberté économique. --- Libre-échange. --- Principes généraux du droit européen. --- Free trade --- Freedom of movement --- International economic relations --- Capital movements --- Libre-échange --- Libre circulation des personnes --- Relations économiques internationales --- Droit international --- Mouvements de capitaux --- Economic aspects. --- Aspect économique --- gegevensbescherming --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- economie --- économie

Listing 1 - 10 of 111 << page
of 12
>>
Sort by