Search Results for Computer crimes - Narrowed by: 2017
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ic$003dtrue$0026ps$003d300?
2026-05-12T04:34:26Z
International encyclopaedia of laws : Cyber law
ent://SD_ILS/0/SD_ILS:271183
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Dumortier, Jos, 1950-<br/>Preferred Shelf Number REF K564.C6 C93 2004<br/>Format: Books<br/>Availability Law Library~1<br/>
Interrupt
ent://SD_ILS/0/SD_ILS:88832
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Dwiggins, Toni.<br/>Preferred Shelf Number PS 3554.W54 I55 1993<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:543286
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author PELTIER, THOMAS R.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
ent://SD_ILS/0/SD_ILS:593609
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Antonucci, Domenic, author.<br/>Preferred Shelf Number HV6773 .A58 2017<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bilişim, kişisel verilerin korunması ve internet iletişimi mevzuatı
ent://SD_ILS/0/SD_ILS:421276
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Dülger, Murat Volkan.<br/>Preferred Shelf Number KKX80.C65 D854 2017<br/>Format: Books<br/>Availability Law Library~1<br/>
Social networking as a criminal enterprise
ent://SD_ILS/0/SD_ILS:544427
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429254789">https://www.taylorfrancis.com/books/9780429254789</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bilişim suçları ve bilişim ceza hukuku
ent://SD_ILS/0/SD_ILS:392236
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Apaydın, Cengiz.<br/>Preferred Shelf Number KKX80.C65 A63 2017<br/>Format: Books<br/>Availability Law Library~1<br/>
Bilişim hukuku
ent://SD_ILS/0/SD_ILS:516341
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Güneysu, Gökhan, editör Karaaslan, Reşit, yazar<br/>Preferred Shelf Number T58.5 B55 2017<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing
ent://SD_ILS/0/SD_ILS:610784
2026-05-12T04:34:26Z
2026-05-12T04:34:26Z
Author Thames, Lane. editor. Schaefer, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-50660-9">https://doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>