Search Results for Computer crimes. - Narrowed by: 2011SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-19T11:43:49ZInterruptent://SD_ILS/0/SD_ILS:888322024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Dwiggins, Toni.<br/>Preferred Shelf Number PS 3554.W54 I55 1993<br/>Format: Books<br/>Availability Beytepe Library~1<br/>International encyclopaedia of laws : Cyber lawent://SD_ILS/0/SD_ILS:2711832024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Dumortier, Jos, 1950-<br/>Preferred Shelf Number REF K564.C6 C93 2004<br/>Format: Books<br/>Availability Law Library~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc.ent://SD_ILS/0/SD_ILS:1465002024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Altheide, Cory. Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495868">http://www.sciencedirect.com/science/book/9781597495868</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and espionage an analysis of subversive multi-vector threatsent://SD_ILS/0/SD_ILS:1475182024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Gragido, Will. Pirc, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim suçları ve soruşturma-kovuşturma evrelerient://SD_ILS/0/SD_ILS:1499352024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Karagülmez, Ali.<br/>Preferred Shelf Number KKX4230 K373 2011<br/>Format: Books<br/>Availability Law Library~1<br/>Türk ceza hukukunda bilişim suçlarıent://SD_ILS/0/SD_ILS:1499372024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Parlar, Ali.<br/>Preferred Shelf Number KKX4230 P37 2011<br/>Format: Books<br/>Availability Law Library~1<br/>Digital evidence and computer crime : forensic science, computers and the Internetent://SD_ILS/0/SD_ILS:2697312024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Casey, Eoghan.<br/>Preferred Shelf Number HV6773.C35 C35 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>FISMA principles and best practices beyond complianceent://SD_ILS/0/SD_ILS:2906542024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:2916402024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Appel, Edward J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827529">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Xbox 360 forensics a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:3065252024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Bolt, Steven. Liles, Samuel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496230">http://www.sciencedirect.com/science/book/9781597496230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber criminology exploring Internet crimes and criminal behaviorent://SD_ILS/0/SD_ILS:2851802024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Jaishankar, K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439829509">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:2852212024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Criminals on Trialent://SD_ILS/0/SD_ILS:2385502024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Smith, Russell G.. Grabosky, Peter. Urbas, Gregor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511481604">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>System forensics, investigation, and responseent://SD_ILS/0/SD_ILS:2715332024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Vacca, John R. Rudolph, K.<br/>Preferred Shelf Number HV8079.C65 V32 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing the risk of fraud and misconduct meeting the challenges of a global, regulated, and digital environmentent://SD_ILS/0/SD_ILS:2929042024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Girgenti, Richard H. Hedley, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/managing-risk-fraud-misconduct-meeting-challenges-global-regulated-digital-environment">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-19T11:43:49Z2024-11-19T11:43:49ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>