Henter eksemplarliste...
Fakta
Laster innhold...
Kopiér til utklippstavle
*0011161544 *008120605s2012 xx# 000 0 nob *019 $bk *08230$a349.54805 *100 $aSunde, Inger Marie$4aut$_136473600 *245 $aDataavlesing *300 $aS. 3-35 *500 $aVitenskapelig artikkel *520 $aEngelsk sammendrag *650 $aelektroniske spor$9nor$2norart$_133077900 *650 $aetterforskning$9nor$2norart$_134142900 *650 $ainformasjonsteknologi (IT)$9nor$2norart$_128598800 *650 $aovervåking$2norart$_65334200 *650 $arettspleielover$9nor$2norart$_137532100 *650 $arettssikkerhet$9nor$2norart$_128749500 *650 $astrafferett$9nor$2norart$_128590300 *653 $a"trojan horse"$9eng$_137532200 *653 $acomputer surveillance$9eng$_137532300 *653 $adigital search$9eng$_137532400 *653 $akeylogging$9eng$_137532500 *653 $apriniple of legality$9eng$_137532600 *653 $arule of law$9eng$_129778000 *653 $asecret computer program$9eng$_137532700 *653 $aseizure and interception$9eng$_137532800 *773 $tRetfærd$gÅrg. 35, nr. 1 = Nr. 136 (2012)$x0105-1121$w(NO-LaBS)32763(tnr) *999 $z1200514789$anorart:1200514789 ^