Search Results for Computer crimes -- Prevention. - Narrowed by: EnglishSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$002b--$002bPrevention.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-11-04T07:43:22ZGlobal cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4821132024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Gunasekhar, T., 1990- author. Rao, K. Thirupathi, author. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering cyber attacks and preserving the integrity and availability of critical systemsent://SD_ILS/0/SD_ILS:4821772024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybervetting : Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:3564182024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Appel, Edward J., author.<br/>Preferred Shelf Number ONLINE(356418.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA principles and best practices beyond complianceent://SD_ILS/0/SD_ILS:2906542024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:2916402024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Appel, Edward J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827529">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1451992024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:1491452024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber fraud tactics, techniques, and proceduresent://SD_ILS/0/SD_ILS:2914672024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Graham, James. Howard, Rick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1122022024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Maynor, David. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1484882024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Maynor, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing a network vulnerability assessmentent://SD_ILS/0/SD_ILS:2891852024-11-04T07:43:22Z2024-11-04T07:43:22ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203503041">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>