Добірка наукової літератури з теми "Protection of the secret of the will"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Protection of the secret of the will".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Protection of the secret of the will"
Selly Olatersia Sembiring and Simona Bustani. "<b>PERLINDUNGAN HUKUM BERDASARKAN UNDANG-UNDANG NO. 30 TAHUN 2000 TENTANG RAHASIA DAGANG</b>." Reformasi Hukum Trisakti 6, no. 3 (2024): 1056–65. http://dx.doi.org/10.25105/refor.v6i3.19947.
Повний текст джерелаVärv, Age, Heiki Pisuke, Tõnis Mets, Elise Vasamäe, and Aleksei Kelli. "Trade Secrets in the Intellectual Property Strategies of Entrepreneurs: The Estonian Experience." Review of Central and East European Law 35, no. 4 (2010): 315–39. http://dx.doi.org/10.1163/157303510x12650378240476.
Повний текст джерелаTambovtsev, Andrei. "The problem of defining and interpreting the concept of ‘secret protection’ in operative-investigative activities." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2025, no. 2 (2025): 211–17. https://doi.org/10.35750/2071-8284-2025-2-211-217.
Повний текст джерелаAspan, Henry, Syaiful Asmi Hasibuan, and Ari Prabowo. "Legal Protection for Trade Secret Holders under the Laws of the Republic of Indonesia Number 30 of 2000 on Trade Secrets." Saudi Journal of Humanities and Social Sciences 7, no. 4 (2022): 149–54. http://dx.doi.org/10.36348/sjhss.2022.v07i04.006.
Повний текст джерелаDirkareshza, Rianda, Muhammad Fauzan, and Aulia Anjani. "Legal Protection Against Misuse Of Trade Secrets: Comparison Study Between Indonesia And France." Indonesia Law Reform Journal 5, no. 1 (2025): 62–76. https://doi.org/10.22219/ilrej.v5i1.38145.
Повний текст джерелаChung, You Na. "Criminal law measures to protect trade secrets: focusing on the Unfair Competition Prevention and Trade Secret Protection Act." Institute for Legal Studies Chonnam National University 43, no. 2 (2023): 119–46. http://dx.doi.org/10.38133/cnulawreview.2023.43.2.119.
Повний текст джерелаAriyanti, Ariyanti. "Perlindungan Hukum Rahasia Perusahaan Melalui Undang-Undang No. 30 Tahun 2000 Tentang Rahasia Dagang." Bhirawa Law Journal 2, no. 2 (2021): 79–86. http://dx.doi.org/10.26905/blj.v2i2.6843.
Повний текст джерелаYusuf Ibrahim, Muhammad, Dyah Ochtorina Susanti, and Suhariningsih Suhariningsih. "Characteristics Of Trade Secrets As Property Rights In The Indonesian Property Law System." International Journal of Educational Research & Social Sciences 4, no. 3 (2023): 498–503. http://dx.doi.org/10.51601/ijersc.v4i3.648.
Повний текст джерелаOliinyk, Vasyl, Larysa Herasymenko, Olena Tykhonova, Ivan Syvodied, and Natalia Holdberh. "Criminal protection of state secrets in Ukraine and EU countries." Cuestiones Políticas 41, no. 76 (2023): 641–61. http://dx.doi.org/10.46398/cuestpol.4176.38.
Повний текст джерелаHabib, Yahya Abdul, and Nyi Mas Gianti Bingah Erbiana. "Implementation of Legal Protection in the Field of Pharmacy in a Juridical Review of the Implementation of Law Number 30 of 2000 Concerning Trade Secrets." International Journal of Business, Law, and Education 6, no. 1 (2025): 277–87. https://doi.org/10.56442/ijble.v6i1.1014.
Повний текст джерелаДисертації з теми "Protection of the secret of the will"
Werly, Stéphane. "La protection du secret rédactionnel /." Genève [u.a.] : Schulthess, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/502310243.pdf.
Повний текст джерелаBitho, Théodore-Alexandre de Nika. "La protection des secrets commerciaux dans l'arbitrage commercial international." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D001.
Повний текст джерелаAl, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.
Повний текст джерелаZemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Повний текст джерелаGonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.
Повний текст джерелаRenner, Soline. "Protection des algorithmes cryptographiques embarqués." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0057/document.
Повний текст джерелаROSSI, PHILIPPE. "Reflexions sur le fondement, l'etendue, la protection et les projets d'actualisation du secret medical." Nice, 1988. http://www.theses.fr/1988NICE6001.
Повний текст джерелаQuennesson, Claire. "Mineur et secret." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0804/document.
Повний текст джерелаOlivari, Medina Cecilia. "L'acceptabilité de la rupture du secret médical pour la protection d'un tiers en danger de contracter une maladie sexuellement transmissible et pour la protection d'un adolescent consommateur de substances, vue par le public chilien." Toulouse 2, 2009. http://www.theses.fr/2009TOU20090.
Повний текст джерелаAbravanel-Jolly, Sabine. "La protection du secret en droit des personnes et de la famille." Lyon 3, 1999. http://www.theses.fr/1999LYO33026.
Повний текст джерелаКниги з теми "Protection of the secret of the will"
Werly, Stéphane. La protection du secret rédactionnel. Schulthess, 2005.
Знайти повний текст джерела1955-, Cundiff Victoria A., ed. Trade secret protection and litigation: Protecting confidential business and technical information. Practising Law Institute, 1992.
Знайти повний текст джерелаCopeland, Gloria. The secret place of God's protection. Kenneth Copeland Publications, 2002.
Знайти повний текст джерелаPeterson, Gale R. Trade secret protection in an information age. Glasser LegalWorks, 1997.
Знайти повний текст джерела(South), Korea, and Korea (South), eds. Yŏngŏp pimil pohopŏp: Trade secret protection act. Pagyŏngsa, 2012.
Знайти повний текст джерелаE, Kay Randall, Edelson Rebecca, and State Bar of California. Intellectual Property Section., eds. Trade secret litigation and protection in California. State Bar of California, 2005.
Знайти повний текст джерелаMagnan, Richard A. Copyright, patent, and trade secret protection of software. Defense Technical Information Center, 1986.
Знайти повний текст джерелаEinschlag, Michael B. Seminar material for copyright, trademark, and trade secret protection. New Jersey Institute for Continuing Legal Education, 1987.
Знайти повний текст джерелаSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Éditions Y. Blais, 2013.
Знайти повний текст джерелаЧастини книг з теми "Protection of the secret of the will"
Halt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_2.
Повний текст джерелаO’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_2.
Повний текст джерелаDesaunettes-Barbero, Luc. "Conclusion: The Distinction Between the Secret Sphere and Secret Pieces of Information—The Need of a New Conceptual Model for Trade Secrets Law." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_11.
Повний текст джерелаMerino, Louis-Henri, and José Cabrero-Holgueras. "Secure Multi-Party Computation." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.
Повний текст джерелаArtemiev, V. P. "The Protection of the Frontiers of the U.S.S.R." In The Soviet Secret Police. Routledge, 2024. http://dx.doi.org/10.4324/9781032676319-9.
Повний текст джерелаDaskapan, Semir. "Dependable Security by Twisted Secret Sharing." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_13.
Повний текст джерелаDesaunettes-Barbero, Luc. "The Legal Apprehension of Secret Pieces of Information as Immaterial Goods Regulation." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_10.
Повний текст джерелаHalt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_8.
Повний текст джерелаO’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_8.
Повний текст джерелаBent, Stephen A., Richard L. Schwaab, David G. Conlin, and Donald D. Jeffery. "Trade Secret and Other Non-Patent Protection." In Intellectual Property Rights in Biotechnology Worldwide. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-08009-0_7.
Повний текст джерелаТези доповідей конференцій з теми "Protection of the secret of the will"
Richter, Isaac, Jie Zhou, and John Criswell. "DeTRAP: RISC-V Return Address Protection With Debug Triggers." In 2024 IEEE Secure Development Conference (SecDev). IEEE, 2024. http://dx.doi.org/10.1109/secdev61143.2024.00021.
Повний текст джерелаMaram, Balajee, Manikonda Srinivasa Sesha Sai, Malathy Vanniappan, T. Aditya Sai Srinivas, Pamarthi Nagaraju, and U. D. Prasan. "Protecting Medical Image Transmission: Color Secret Sharing Protocol for Enhanced Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882318.
Повний текст джерелаArora, Jatin, Kamal Saluja, G. S. Pradeep Ghantasala, et al. "Protecting SDIIOT Network from Key Breach Attack by using Secret Hash Chain Techniques." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877628.
Повний текст джерелаBotha, Craig. "Benchmarking International Cathodic Protection and Alternating Current Mitigation Standards to Determine Suitable Protection Criteria." In MECC 2023. AMPP, 2023. https://doi.org/10.5006/mecc2023-20206.
Повний текст джерелаLane, Rebekah, and Stephen A. Torri. "Comparing iOS and Android Anti-Virus Protection: A Survey." In 2024 Ninth International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2024. http://dx.doi.org/10.1109/mobisecserv63327.2024.10759904.
Повний текст джерелаRejintal, Chaitanya, and Manoranjan Kumar. "Secret image protection using image fusion." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7807866.
Повний текст джерелаTso, Hao-Kuan, and Der-Chyuan Lou. "Medical image protection using secret sharing scheme." In the 6th International Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184860.
Повний текст джерелаInoue, Michiko, Tomokazu Yoneda, Muneo Hasegawa, and Hideo Fujiwara. "Partial Scan Approach for Secret Information Protection." In 2009 14th IEEE European Test Symposium (ETS). IEEE, 2009. http://dx.doi.org/10.1109/ets.2009.15.
Повний текст джерелаAprilPyone, MaungMaung, and Hitoshi Kiya. "Transfer Learning-Based Model Protection With Secret Key." In 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021. http://dx.doi.org/10.1109/icip42928.2021.9506147.
Повний текст джерелаChen, Chao, Zhiyuan An, and Fangguo Zhang. "Shorter Post-quantum Secret Handshakes from Isogenies." In 2023 International Conference on Data Security and Privacy Protection (DSPP). IEEE, 2023. http://dx.doi.org/10.1109/dspp58763.2023.10405180.
Повний текст джерелаЗвіти організацій з теми "Protection of the secret of the will"
Chandramouli, Ramaswamy. Secure Virtual Network Configuration for Virtual Machine (VM) Protection. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-125b.
Повний текст джерелаPappas, Mersene. Elsie's Secret. Portland State University Library, 2016. http://dx.doi.org/10.15760/honors.277.
Повний текст джерелаWong, Theodore M., and Jeannette M. Wing. Verifiable Secret Redistribution. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada458508.
Повний текст джерелаDang, Tri Vi, Gary Gorton, Bengt Holmström, and Guillermo Ordonez. Banks as Secret Keepers. National Bureau of Economic Research, 2014. http://dx.doi.org/10.3386/w20255.
Повний текст джерелаKarch, Benjamin. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2480123.
Повний текст джерелаKarch, Benjamin, Titus Gray, and Michael Rowland. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462968.
Повний текст джерелаSeybold, Patricia. Secret to Successful Customer Engagements. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/me09-26-13cc.
Повний текст джерелаGorman, Paul F. The Secret of Future Victories. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada250718.
Повний текст джерелаNottingham, M. The "secret-token" URI Scheme. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8959.
Повний текст джерелаRossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.
Повний текст джерела