Search Results for Computer crimes. - Narrowed by: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026pe$003dd$00253A$0026ps$003d300? 2024-11-13T02:56:19Z Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimes ent://SD_ILS/0/SD_ILS:285174 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Marcella, Albert J.&#160;Menendez, Doug.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439848234">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International encyclopaedia of laws : Cyber law ent://SD_ILS/0/SD_ILS:271183 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Dumortier, Jos, 1950-<br/>Preferred Shelf Number&#160;REF K564.C6 C93 2004<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Interrupt ent://SD_ILS/0/SD_ILS:88832 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Dwiggins, Toni.<br/>Preferred Shelf Number&#160;PS 3554.W54 I55 1993<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malicious bots an inside look into the cyber-criminal underground of the internet ent://SD_ILS/0/SD_ILS:288747 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Dunham, Ken.&#160;Melnick, Jim.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420069068">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:291349 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Brancik, Kenneth C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology law ent://SD_ILS/0/SD_ILS:134669 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Lloyd, Ian J.<br/>Preferred Shelf Number&#160;KD667.C65 L58 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bili&#351;im su&ccedil;lar&#305; ent://SD_ILS/0/SD_ILS:131458 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Ta&#351;k&#305;n, &#350;aban Cankat.<br/>Preferred Shelf Number&#160;KKX4230 .T37 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Siber su&ccedil;larin cezaland&#305;r&#305;lmas&#305; ve T&uuml;rkiye'de durum ent://SD_ILS/0/SD_ILS:135278 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Erg&uuml;n, &#304;smail.<br/>Preferred Shelf Number&#160;HV6773.3.T9 E738 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Author&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Avrupa konseyi siber su&ccedil;lar s&ouml;zle&#351;mesi tasla&#287;&#305;. ent://SD_ILS/0/SD_ILS:393383 2024-11-13T02:56:19Z 2024-11-13T02:56:19Z Preferred Shelf Number&#160;KJC8643 A5 A97 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/>