Search Results for Computer crimes - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2025-12-28T20:59:15Z
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber law, privacy, and security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482239
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483478
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:486312
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Yoo, Chang D. editor. Shi, Yun-Qing. editor. Kim, Hyoung Joong. editor. Piva, Alessandro. editor. (orcid)0000-0002-3047-0519 Kim, Gwangsu. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485414
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Perdisci, Roberto. editor. Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494 Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017 Almgren, Magnus. editor. (orcid)0000-0002-3383-9617 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Trends in the Industrial Internet of Things
ent://SD_ILS/0/SD_ILS:486998
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484061
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:482971
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Brefeld, Ulf. editor. Curry, Edward. editor. Daly, Elizabeth. editor. MacNamee, Brian. editor. (orcid)0000-0003-2518-0274 Marascu, Alice. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483391
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485944
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Cybenko, George. editor. (orcid)0000-0001-7734-2912 Pym, David. editor. (orcid)0000-0002-6504-5838 Fila, Barbara. editor. (orcid)0000-0002-1824-7621 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Proceedings of CSI 2015
ent://SD_ILS/0/SD_ILS:400943
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Bokhari, M. U. editor. Agrawal, Namrata. editor. Saini, Dharmendra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria
ent://SD_ILS/0/SD_ILS:401736
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA
ent://SD_ILS/0/SD_ILS:399039
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Nicholson, Denise. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OS X incident response : scripting and analysis
ent://SD_ILS/0/SD_ILS:458869
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Bradley, Jaron, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack : the v3rb0ten network
ent://SD_ILS/0/SD_ILS:458624
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Technocrime, policing and surveillance
ent://SD_ILS/0/SD_ILS:260674
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Leman-Langlois, Stéphane, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for handheld devices
ent://SD_ILS/0/SD_ILS:541429
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Doherty, Eamon P., author.<br/>Preferred Shelf Number HV8079 .C65 D64 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Malware forensics field guide for Windows dystems digital forensics field guides
ent://SD_ILS/0/SD_ILS:147898
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking web apps detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:148161
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning forensics for law enforcement, security, and intelligence
ent://SD_ILS/0/SD_ILS:544765
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Mena, Jesus., author.<br/>Preferred Shelf Number HV8073 .M395 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:145199
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber fraud : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:540157
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Graham, James. Howard, Rick.<br/>Preferred Shelf Number HV6773 .H69 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Profiling hackers : the science of criminal profiling as applied to the world of hacking
ent://SD_ILS/0/SD_ILS:545973
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Chiesa, Raoul, 1973, author. Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number HV6773 .C477 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Malware forensics investigating and analyzing malicious code
ent://SD_ILS/0/SD_ILS:147914
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Scene of the cybercrime
ent://SD_ILS/0/SD_ILS:148955
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.
ent://SD_ILS/0/SD_ILS:112206
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Kleiman, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis DVD toolkit
ent://SD_ILS/0/SD_ILS:112211
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Carvey, Harlan A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:112214
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis DVD toolkit
ent://SD_ILS/0/SD_ILS:145678
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:145680
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.
ent://SD_ILS/0/SD_ILS:148388
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Techno security's guide to e-discovery and digital forensics
ent://SD_ILS/0/SD_ILS:148564
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:112202
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Maynor, David. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:148488
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Maynor, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stealing the network how to own an identity
ent://SD_ILS/0/SD_ILS:253663
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software piracy exposed
ent://SD_ILS/0/SD_ILS:253664
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hack proofing your identity in the information age protect your family on the internet!
ent://SD_ILS/0/SD_ILS:253617
2025-12-28T20:59:15Z
2025-12-28T20:59:15Z
Author Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>