Search Results for Computer crimes - Narrowed by: 2017
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ps$003d300?
2026-01-24T18:12:09Z
International encyclopaedia of laws : Cyber law
ent://SD_ILS/0/SD_ILS:271183
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author Dumortier, Jos, 1950-<br/>Preferred Shelf Number REF K564.C6 C93 2004<br/>Format: Books<br/>Availability Law Library~1<br/>
Interrupt
ent://SD_ILS/0/SD_ILS:88832
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author Dwiggins, Toni.<br/>Preferred Shelf Number PS 3554.W54 I55 1993<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Bilişim hukuku
ent://SD_ILS/0/SD_ILS:516341
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author Güneysu, Gökhan, editör Karaaslan, Reşit, yazar<br/>Preferred Shelf Number T58.5 B55 2017<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Bilişim suçları ve bilişim ceza hukuku
ent://SD_ILS/0/SD_ILS:392236
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author Apaydın, Cengiz.<br/>Preferred Shelf Number KKX80.C65 A63 2017<br/>Format: Books<br/>Availability Law Library~1<br/>
Bilişim, kişisel verilerin korunması ve internet iletişimi mevzuatı
ent://SD_ILS/0/SD_ILS:421276
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author Dülger, Murat Volkan.<br/>Preferred Shelf Number KKX80.C65 D854 2017<br/>Format: Books<br/>Availability Law Library~1<br/>
Social networking as a criminal enterprise
ent://SD_ILS/0/SD_ILS:544427
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429254789">https://www.taylorfrancis.com/books/9780429254789</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:543286
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author PELTIER, THOMAS R.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
ent://SD_ILS/0/SD_ILS:593609
2026-01-24T18:12:09Z
2026-01-24T18:12:09Z
Author Antonucci, Domenic, author.<br/>Preferred Shelf Number HV6773 .A58 2017<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>