Search Results for Computer crimes - Narrowed by: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-08T15:22:23Z Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes ent://SD_ILS/0/SD_ILS:539752 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Marcella, Albert J.&#160;Menendez, Doug.<br/>Preferred Shelf Number&#160;HV8079 .C65 C93 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439848234">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> International encyclopaedia of laws : Cyber law ent://SD_ILS/0/SD_ILS:271183 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Dumortier, Jos, 1950-<br/>Preferred Shelf Number&#160;REF K564.C6 C93 2004<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Interrupt ent://SD_ILS/0/SD_ILS:88832 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Dwiggins, Toni.<br/>Preferred Shelf Number&#160;PS 3554.W54 I55 1993<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information technology law ent://SD_ILS/0/SD_ILS:134669 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Lloyd, Ian J.<br/>Preferred Shelf Number&#160;KD667.C65 L58 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Siber su&ccedil;larin cezaland&#305;r&#305;lmas&#305; ve T&uuml;rkiye'de durum ent://SD_ILS/0/SD_ILS:135278 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Erg&uuml;n, &#304;smail.<br/>Preferred Shelf Number&#160;HV6773.3.T9 E738 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bili&#351;im su&ccedil;lar&#305; ent://SD_ILS/0/SD_ILS:131458 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Ta&#351;k&#305;n, &#350;aban Cankat.<br/>Preferred Shelf Number&#160;KKX4230 .T37 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Avrupa konseyi siber su&ccedil;lar s&ouml;zle&#351;mesi tasla&#287;&#305;. ent://SD_ILS/0/SD_ILS:393383 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Preferred Shelf Number&#160;KJC8643 A5 A97 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2025-12-08T15:22:23Z 2025-12-08T15:22:23Z Author&#160;Brancik, Kenneth C., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B725 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>