Search Results for Computer crimes -- Case studies.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$002b--$002bCase$002bstudies.$0026ps$003d300?dt=list2024-11-23T21:53:21ZDissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242024-11-23T21:53:21Z2024-11-23T21:53:21ZAuthor Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852024-11-23T21:53:21Z2024-11-23T21:53:21ZAuthor Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-23T21:53:21Z2024-11-23T21:53:21ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malicious bots an inside look into the cyber-criminal underground of the internetent://SD_ILS/0/SD_ILS:2887472024-11-23T21:53:21Z2024-11-23T21:53:21ZAuthor Dunham, Ken. Melnick, Jim.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420069068">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>