Uneingeschränkter Zugang

Virtualization Solutions Supporting Privacy and Data Protection in Online Activities

   | 23. Juli 2019

Zitieren

[1] https://ccdcoe.org/library/publications/open-source-intelligence-open-social-intelligence-and-privacy-by-design-a-meta-level-rule-of-law/.Search in Google Scholar

[2] https://www.hotnews.ro/stiri-esential-18726335-pagina-facebook-este-spatiu-public-nuprivat-arata-decizie-irevocabila-inaltei-curti-justitie-casatie.htm.Search in Google Scholar

[3] https://uklabourlawblog.com/2018/06/22/i-lost-my-job-over-a-facebook-post-was-that-fair/.Search in Google Scholar

[4] Gábor Pék, Levente Buttyán, Boldizsár Bencsáth, A Survey of Security Issues in Hardware Virtualization, ACM Computing Surveys, Vol. 45, No. 3, Article 40, Publication date: June 2013, p. 40:1.10.1145/2480741.2480757Search in Google Scholar

[5] https://www.vmware.com/support/ws4/doc/preserve_snapshot_ws.html.Search in Google Scholar

[6] Kathleen Downer, Maumita Bhattacharya, BYOD Security: A New Business Challenge, The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press.10.1109/SmartCity.2015.221Search in Google Scholar

[7] Teemu Väisänen, Alexandria Farar, Nikolaos Pissanidis, Christian Braccini, Bemhards Blumbergs, Enrique Diez, Defending mobile devices for high level officials and decision-makers, NATO Cooperative Cyber Defence Centre of Excellence, Tallin, 2015, p. 74.Search in Google Scholar

[8] https://svmp.github.io/.Search in Google Scholar