Search Results for Computer crimes. - Narrowed by: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026pe$003dd$00253A$0026ps$003d300?2024-11-13T02:56:19ZCyber forensics a field manual for collecting, examining, and preserving evidence of computer crimesent://SD_ILS/0/SD_ILS:2851742024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Marcella, Albert J. Menendez, Doug.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439848234">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>International encyclopaedia of laws : Cyber lawent://SD_ILS/0/SD_ILS:2711832024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Dumortier, Jos, 1950-<br/>Preferred Shelf Number REF K564.C6 C93 2004<br/>Format: Books<br/>Availability Law Library~1<br/>Interruptent://SD_ILS/0/SD_ILS:888322024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Dwiggins, Toni.<br/>Preferred Shelf Number PS 3554.W54 I55 1993<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Profiling hackers the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:2914122024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malicious bots an inside look into the cyber-criminal underground of the internetent://SD_ILS/0/SD_ILS:2887472024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Dunham, Ken. Melnick, Jim.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420069068">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider computer fraud an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:2913492024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Brancik, Kenneth C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information technology lawent://SD_ILS/0/SD_ILS:1346692024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Lloyd, Ian J.<br/>Preferred Shelf Number KD667.C65 L58 2008<br/>Format: Books<br/>Availability Law Library~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim suçlarıent://SD_ILS/0/SD_ILS:1314582024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Taşkın, Şaban Cankat.<br/>Preferred Shelf Number KKX4230 .T37 2008<br/>Format: Books<br/>Availability Law Library~1<br/>Siber suçlarin cezalandırılması ve Türkiye'de durument://SD_ILS/0/SD_ILS:1352782024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Ergün, İsmail.<br/>Preferred Shelf Number HV6773.3.T9 E738 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552024-11-13T02:56:19Z2024-11-13T02:56:19ZAuthor Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Avrupa konseyi siber suçlar sözleşmesi taslağı.ent://SD_ILS/0/SD_ILS:3933832024-11-13T02:56:19Z2024-11-13T02:56:19ZPreferred Shelf Number KJC8643 A5 A97 2008<br/>Format: Books<br/>Availability Law Library~1<br/>