Search Results for Computer crimes - Narrowed by: Wiley E-Book Collection SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ps$003d300$0026isd$003dtrue? 2026-01-22T21:42:14Z Cognitive cyber crimes in the era of artificial intelligence ent://SD_ILS/0/SD_ILS:600325 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Chakrawarti, Rajesh Kumar, editor.<br/>Preferred Shelf Number&#160;HV6773 .C64 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394386574">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394386574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applying artificial intelligence in cyber security analytics and cyber threat detection ent://SD_ILS/0/SD_ILS:599037 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Mahajan, Shilpa, editor.&#160;Khurana, Mehak, editor.&#160;Estrela, Vania Vieira, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A674 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cyber intelligence : a hands-on guide to digital forensics ent://SD_ILS/0/SD_ILS:599262 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 J633 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime during the SARS-CoV-2 pandemic (2019-2022) ent://SD_ILS/0/SD_ILS:598517 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Ventre, Daniel, editor.&#160;Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number&#160;HV6773 .C93 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber investigations : a research based textbook for advanced studies ent://SD_ILS/0/SD_ILS:597931 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65 C933 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime investigators handbook ent://SD_ILS/0/SD_ILS:595400 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Edwards, Graeme (Financial and cybercrime investigator), author.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques ent://SD_ILS/0/SD_ILS:595783 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Troia, Vinny, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 T76 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:594967 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;McDonough, Bart R., author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence ent://SD_ILS/0/SD_ILS:594530 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Furneaux, Nick, author.&#160;Knottenbelt, William J., writer of foreword.<br/>Preferred Shelf Number&#160;HV8079 .C65 F87 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cyber risk handbook : creating and measuring effective cybersecurity capabilities ent://SD_ILS/0/SD_ILS:593609 2026-01-22T21:42:14Z 2026-01-22T21:42:14Z Author&#160;Antonucci, Domenic, author.<br/>Preferred Shelf Number&#160;HV6773 .A58 2017<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>