Search Results for Computer crimes.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes.$0026te$003dILS$0026ps$003d300?dt=list2024-12-22T18:10:25ZCyber forensics a field manual for collecting, examining, and preserving evidence of computer crimesent://SD_ILS/0/SD_ILS:2851742024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Marcella, Albert J. Menendez, Doug.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439848234">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimesent://SD_ILS/0/SD_ILS:2855902024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Marcella, Albert J. Greenfield, Robert S., 1961-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420000115">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Interruptent://SD_ILS/0/SD_ILS:888322024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dwiggins, Toni.<br/>Preferred Shelf Number PS 3554.W54 I55 1993<br/>Format: Books<br/>Availability Beytepe Library~1<br/>International encyclopaedia of laws : Cyber lawent://SD_ILS/0/SD_ILS:2711832024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dumortier, Jos, 1950-<br/>Preferred Shelf Number REF K564.C6 C93 2004<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim hukukuent://SD_ILS/0/SD_ILS:5230302024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Turan, Metin.<br/>Preferred Shelf Number KKX80.C65 T87 2024<br/>Format: Books<br/>Availability Law Library~1<br/>Ethical and Secure Computing A Concise Moduleent://SD_ILS/0/SD_ILS:5205902024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520590.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31906-8">https://doi.org/10.1007/978-3-031-31906-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:5205702024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520570.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-24863-4">https://doi.org/10.1007/978-3-031-24863-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim hukukuent://SD_ILS/0/SD_ILS:4232662024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Turan, Metin.<br/>Preferred Shelf Number KKX80.C65 T87 2019<br/>Format: Books<br/>Availability Law Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4821132024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Gunasekhar, T., 1990- author. Rao, K. Thirupathi, author. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4829712024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Brefeld, Ulf. editor. Curry, Edward. editor. Daly, Elizabeth. editor. MacNamee, Brian. editor. (orcid)0000-0003-2518-0274 Marascu, Alice. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Securityent://SD_ILS/0/SD_ILS:4842012024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberdanger Understanding and Guarding Against Cybercrimeent://SD_ILS/0/SD_ILS:4859362024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4859442024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Cybenko, George. editor. (orcid)0000-0001-7734-2912 Pym, David. editor. (orcid)0000-0002-6504-5838 Fila, Barbara. editor. (orcid)0000-0002-1824-7621 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4863122024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Yoo, Chang D. editor. Shi, Yun-Qing. editor. Kim, Hyoung Joong. editor. Piva, Alessandro. editor. (orcid)0000-0002-3047-0519 Kim, Gwangsu. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Deep Learning Applications for Cyber Securityent://SD_ILS/0/SD_ILS:4866942024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704 Tang, MingJian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering cyber attacks and preserving the integrity and availability of critical systemsent://SD_ILS/0/SD_ILS:4821772024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4833912024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4835932024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4834782024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4842752024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4838082024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy Trends in the Industrial Internet of Thingsent://SD_ILS/0/SD_ILS:4869982024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4870062024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983 Sánchez González, Lidia. editor. (orcid)0000-0002-0760-1170 Castejón Limas, Manuel. editor. (orcid)0000-0002-5152-4555 Quintián Pardo, Héctor. editor. (orcid)0000-0002-0268-7999 Corchado Rodríguez, Emilio. editor. (orcid)0000-0001-8560-3991<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber law, privacy, and security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4822392024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4830132024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Securityent://SD_ILS/0/SD_ILS:4839472024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Cybenko, George. editor. Liu, Peng. editor. Wang, Cliff. editor. Wellman, Michael. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4840612024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4854142024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Perdisci, Roberto. editor. Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494 Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017 Almgren, Magnus. editor. (orcid)0000-0002-3383-9617 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:3989662024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:3990392024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Nicholson, Denise. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Analyzing human behavior in cyberspaceent://SD_ILS/0/SD_ILS:4819302024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Yan, Zheng, 1958- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim, kişisel verilerin korunması ve internet iletişimi mevzuatıent://SD_ILS/0/SD_ILS:3922472024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dülger, Murat Volkan.<br/>Preferred Shelf Number KKX80.C65 D854 2018<br/>Format: Books<br/>Availability Law Library~1<br/>Mobile network forensics : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4817962024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Sharevski, Filipo, 1985- author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:4009432024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Bokhari, M. U. editor. Agrawal, Namrata. editor. Saini, Dharmendra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:4017362024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dijital diktatörlük : kitlesel gözetim verilerin kötüye kullanımı siber savaşent://SD_ILS/0/SD_ILS:5090652024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Aust, Stefan. Ünal, Hayriye, 1973- Aust, Stefan. Yücel, Erdinç. Yılmaz, Hasan.<br/>Preferred Shelf Number JF1525.W45 A46419 2018<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Bilişim suçları ve bilişim ceza hukukuent://SD_ILS/0/SD_ILS:3922362024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Apaydın, Cengiz.<br/>Preferred Shelf Number KKX80.C65 A63 2017<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim, kişisel verilerin korunması ve internet iletişimi mevzuatıent://SD_ILS/0/SD_ILS:4212762024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dülger, Murat Volkan.<br/>Preferred Shelf Number KKX80.C65 D854 2017<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim hukukuent://SD_ILS/0/SD_ILS:5163412024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Güneysu, Gökhan, editör Karaaslan, Reşit, yazar<br/>Preferred Shelf Number T58.5 B55 2017<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Implementing digital forensic readiness : from reactive to proactive processent://SD_ILS/0/SD_ILS:4587712024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Sachowski, Jason, author. Ivtchenko, Dmitri, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044544">https://www.sciencedirect.com/science/book/9780128044544</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:4587772024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enformatik, toplum ve hukukent://SD_ILS/0/SD_ILS:3806952024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Gürsul, Fatih.<br/>Preferred Shelf Number KKX80.C65 E547 2016<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim - iletişim mevzuatıent://SD_ILS/0/SD_ILS:3794312024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Özmen, Remzi.<br/>Preferred Shelf Number KKX80 B55 2016<br/>Format: Books<br/>Availability Law Library~1<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:4588692024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Bradley, Jaron, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Türk ceza hukukunda bilişim suçlarıent://SD_ILS/0/SD_ILS:3841422024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Parlar, Ali.<br/>Preferred Shelf Number KKX4230 P37 2015<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim suçları ve internet iletişim mevzuatı : 6518, 6526, 6527, 6552 ve 6572 sayılı yasa değişiklikleri ileent://SD_ILS/0/SD_ILS:3843102024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dülger, Murat Volkan<br/>Preferred Shelf Number KKX4230 D854 2015<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim suçlarıent://SD_ILS/0/SD_ILS:3843112024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Akarslan, Hüseyin<br/>Preferred Shelf Number KKX4230 A33 2015<br/>Format: Books<br/>Availability Law Library~1<br/>Hacker Blackhatent://SD_ILS/0/SD_ILS:3796822024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Mann, Michael, 1943- film director, film producer. Foehl, Morgan Davis, screenwriter. Tull, Thomas, film producer. Hemsworth, Chris, actor. Davis, Viola, 1965- actor.<br/>Preferred Shelf Number PN1995.9.C66 H335 2015<br/>Electronic Access <a href="http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1">http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1</a>
<a href="http://www.mrqe.com/movie_reviews/blackhat-m100112414">http://www.mrqe.com/movie_reviews/blackhat-m100112414</a><br/>Format: Visual Materials<br/>Availability Beytepe Library~1<br/>Bilişim suçları ve internet iletişim hukukuent://SD_ILS/0/SD_ILS:3796852024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dülger, Murat Volkan.<br/>Preferred Shelf Number KKX4230 D85 2015<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim suçları ve adli bilişim : elektronik delillerin toplanması, muhafazası, değerlendirilmesi, sunulmasıent://SD_ILS/0/SD_ILS:3842202024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Orta, Mesut<br/>Preferred Shelf Number KKX4230 O78 2015<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim suçları ve bilişim yoluyla işlenen suçlar : soruşturma ve kovuşturma yöntemlerient://SD_ILS/0/SD_ILS:3775642024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Demir, Ömer Arıç, Mehmet. Polat, Halil.<br/>Preferred Shelf Number KKX4230 D46 2015<br/>Format: Books<br/>Availability Law Library~1<br/>Cybervetting : Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:3564182024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Appel, Edward J., author.<br/>Preferred Shelf Number ONLINE(356418.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Citizenfourent://SD_ILS/0/SD_ILS:3722712024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Poitras, Laura film director, film producer. Snowden, Edward J., 1983- on-screen presenter. Greenwald, Glenn. on-screen presenter. Radius-TWC (Firm), publisher. Anchor Bay Entertainment, Inc., film distributor.<br/>Preferred Shelf Number PN1995.9.D6 C58 2015<br/>Format: Video disc<br/>Availability Beytepe Library~1<br/>Dissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital archaeology : the art and science of digital forensicsent://SD_ILS/0/SD_ILS:3640722024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Graves, Michael W.<br/>Preferred Shelf Number HV8079.C65 G729 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:3428862024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud Storage Forensicsent://SD_ILS/0/SD_ILS:3561322024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Quick, Darren, author. Martini, Ben, 1990- author. Choo, Kim-Kwang Raymond, author.<br/>Preferred Shelf Number ONLINE(356132.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199705">http://www.sciencedirect.com/science/book/9780124199705</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wikileaks:Beşinci kuvvet Wikileaks: The Fifth Estateent://SD_ILS/0/SD_ILS:3195552024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Condon, Bill Singer, Josh Harding,Luke Leigh, David Katz, Virginia<br/>Preferred Shelf Number PN1995.9.B55 W555 2014<br/>Format: Visual Materials<br/>Availability Beytepe Library~2<br/>Cyber crime and cyber terrorism investigator's handbookent://SD_ILS/0/SD_ILS:3556532024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Akhgar, Babak. Staniforth, Andrew. Bosco, Francesca.<br/>Preferred Shelf Number ONLINE(355653.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007433">http://www.sciencedirect.com/science/book/9780128007433</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social networking as a criminal enterpriseent://SD_ILS/0/SD_ILS:3563542024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Marcum, Catherine Davis, 1980- editor. Higgins, George E., editor.<br/>Preferred Shelf Number ONLINE(356354.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466589827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Güncel tehdit : siber suçlarent://SD_ILS/0/SD_ILS:5175692024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Ocak, Mehmet Akif. Çakır, Hüseyin. Kılıç, Mehmet Serkan.<br/>Preferred Shelf Number KKX80 C35 2014<br/>Format: Books<br/>Availability Law Library~1<br/>Adli bilişiment://SD_ILS/0/SD_ILS:5176242024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Henkoğlu, Türkay.<br/>Preferred Shelf Number KKX80.C65 H46 2014<br/>Format: Books<br/>Availability Law Library~1<br/>Bilişim suçları ve internet iletişim hukuku : 6518, 6526, 6527, 6552 sayılı yasa değişiklikleri ileent://SD_ILS/0/SD_ILS:5174542024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dülger, Murat Volkan<br/>Preferred Shelf Number KKX4230 D855 2014<br/>Format: Books<br/>Availability Law Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:2862482024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Doherty, Eamon P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439898789">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigating computer-related crimeent://SD_ILS/0/SD_ILS:2893922024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Stephenson, Peter. Gilbert, Keith, 1988-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003703">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics processing and procedures meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirementsent://SD_ILS/0/SD_ILS:3066942024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Watson, David (David Lilburn) Jones, Andrew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497428">http://www.sciencedirect.com/science/book/9781597497428</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:2606742024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Leman-Langlois, Stéphane, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber power : crime, conflict and security in cyberspaceent://SD_ILS/0/SD_ILS:3425982024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Ghernaouti-Hélie, Solange, 1958- author.<br/>Preferred Shelf Number ONLINE(342598.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İnternet hukukuent://SD_ILS/0/SD_ILS:5175952024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Sieber,Ulrich. aut. Hakeri, Hakan çev. İçel, Kayıhan Proje yön. Ünver, Yener ed.<br/>Preferred Shelf Number K564 I58 2013<br/>Format: Books<br/>Availability Law Library~1<br/>The basics of digital forensics the primer for getting started in digital forensicsent://SD_ILS/0/SD_ILS:1452352024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Sammons, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496612">http://www.sciencedirect.com/science/book/9781597496612</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:1462742024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malware forensics field guide for Windows dystems digital forensics field guidesent://SD_ILS/0/SD_ILS:1478982024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberbullying prevention and response : expert perspectivesent://SD_ILS/0/SD_ILS:2613622024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Patchin, Justin W., 1977- Hinduja, Sameer, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203818312">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and the law challenges, issues, and outcomesent://SD_ILS/0/SD_ILS:2418212024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Brenner, Susan W., 1947- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and espionage an analysis of subversive multi-vector threatsent://SD_ILS/0/SD_ILS:1475182024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Gragido, Will. Pirc, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc.ent://SD_ILS/0/SD_ILS:1465002024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Altheide, Cory. Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495868">http://www.sciencedirect.com/science/book/9781597495868</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Criminals on Trialent://SD_ILS/0/SD_ILS:2385502024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Smith, Russell G.. Grabosky, Peter. Urbas, Gregor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511481604">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>System forensics, investigation, and responseent://SD_ILS/0/SD_ILS:2715332024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Vacca, John R. Rudolph, K.<br/>Preferred Shelf Number HV8079.C65 V32 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:2852212024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA principles and best practices beyond complianceent://SD_ILS/0/SD_ILS:2906542024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber criminology exploring Internet crimes and criminal behaviorent://SD_ILS/0/SD_ILS:2851802024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Jaishankar, K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439829509">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Xbox 360 forensics a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:3065252024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Bolt, Steven. Liles, Samuel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496230">http://www.sciencedirect.com/science/book/9781597496230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim suçları ve soruşturma-kovuşturma evrelerient://SD_ILS/0/SD_ILS:1499352024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Karagülmez, Ali.<br/>Preferred Shelf Number KKX4230 K373 2011<br/>Format: Books<br/>Availability Law Library~1<br/>Türk ceza hukukunda bilişim suçlarıent://SD_ILS/0/SD_ILS:1499372024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Parlar, Ali.<br/>Preferred Shelf Number KKX4230 P37 2011<br/>Format: Books<br/>Availability Law Library~1<br/>Digital evidence and computer crime : forensic science, computers and the Internetent://SD_ILS/0/SD_ILS:2697312024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Casey, Eoghan.<br/>Preferred Shelf Number HV6773.C35 C35 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:2916402024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Appel, Edward J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827529">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing the risk of fraud and misconduct meeting the challenges of a global, regulated, and digital environmentent://SD_ILS/0/SD_ILS:2929042024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Girgenti, Richard H. Hedley, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/managing-risk-fraud-misconduct-meeting-challenges-global-regulated-digital-environment">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:1464822024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:1532952024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Casey, Eoghan. Altheide, Cory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329101">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329101</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:1491452024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1451992024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital triage forensics processing the digital crime sceneent://SD_ILS/0/SD_ILS:1466722024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Pearson, Stephen, 1963- Watson, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495967">http://www.sciencedirect.com/science/book/9781597495967</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:1467152024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:1481732024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Casey, Eoghan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123742674">http://www.sciencedirect.com/science/book/9780123742674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles of cybercrimeent://SD_ILS/0/SD_ILS:2779952024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Clough, Jonathan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:3063302024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber kids, cyber bullying, cyber balanceent://SD_ILS/0/SD_ILS:3123302024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Trolley, Barbara (Barbara C.) Hanel, Constance.<br/>Preferred Shelf Number LB3013.3 T76 2010<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cyber-bullying : issues and solutions for the school, the classroom and the homeent://SD_ILS/0/SD_ILS:3120712024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Shariff, Shaheen.<br/>Preferred Shelf Number LB3013.3 S467 2010<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:2700302024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Casey, Eoghan.<br/>Preferred Shelf Number TK7868 C37 2010<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco router and switch forensics investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:1487032024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim suçları ve soruşturma-kovuşturma evrelerient://SD_ILS/0/SD_ILS:1317772024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Karagülmez, Ali.<br/>Preferred Shelf Number KKX4230 .K373 2009<br/>Format: Books<br/>Availability Law Library~1<br/>Computer forensics and cyber crime : an introductionent://SD_ILS/0/SD_ILS:1340362024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cyber bullying : protecting kids and adults from online bulliesent://SD_ILS/0/SD_ILS:1348162024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor McQuade, Samuel C. Colt, James P. Meyer, Nancy B. B.<br/>Preferred Shelf Number HV6773 .M395 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Computer crimeent://SD_ILS/0/SD_ILS:2697742024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carr, Indira.<br/>Preferred Shelf Number KF9350 C645 2009<br/>Format: Books<br/>Availability Law Library~1<br/>Profiling hackers the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:2914122024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber fraud tactics, techniques, and proceduresent://SD_ILS/0/SD_ILS:2914672024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Graham, James. Howard, Rick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Siber suçlarin cezalandırılması ve Türkiye'de durument://SD_ILS/0/SD_ILS:1352782024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Ergün, İsmail.<br/>Preferred Shelf Number HV6773.3.T9 E738 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Bilişim suçlarıent://SD_ILS/0/SD_ILS:1314582024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Taşkın, Şaban Cankat.<br/>Preferred Shelf Number KKX4230 .T37 2008<br/>Format: Books<br/>Availability Law Library~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information technology lawent://SD_ILS/0/SD_ILS:1346692024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Lloyd, Ian J.<br/>Preferred Shelf Number KD667.C65 L58 2008<br/>Format: Books<br/>Availability Law Library~1<br/>Insider computer fraud an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:2913492024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Brancik, Kenneth C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malicious bots an inside look into the cyber-criminal underground of the internetent://SD_ILS/0/SD_ILS:2887472024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dunham, Ken. Melnick, Jim.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420069068">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Avrupa konseyi siber suçlar sözleşmesi taslağı.ent://SD_ILS/0/SD_ILS:3933832024-12-22T18:10:25Z2024-12-22T18:10:25ZPreferred Shelf Number KJC8643 A5 A97 2008<br/>Format: Books<br/>Availability Law Library~1<br/>Alternate data storage forensicsent://SD_ILS/0/SD_ILS:1452332024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Schroader, Amber. Cohen, Tyler.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491631">http://www.sciencedirect.com/science/book/9781597491631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The best damn cybercrime and digital forensics book periodent://SD_ILS/0/SD_ILS:1451972024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Cardwell, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492287">http://www.sciencedirect.com/science/book/9781597492287</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:1476422024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Reyes, Anthony.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491334">http://www.sciencedirect.com/science/book/9781597491334</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1483882024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CD and DVD forensicsent://SD_ILS/0/SD_ILS:1488002024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Crowley, Paul. Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491280">http://www.sciencedirect.com/science/book/9781597491280</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1456782024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer forensics : evidence collection and managementent://SD_ILS/0/SD_ILS:1103192024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Newman, Robert C.<br/>Preferred Shelf Number KF8961 .N49 2007<br/>Format: Books<br/>Availability Law Library~1<br/>Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:1121572024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Reyes, Anthony. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491334">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless crime and forensic investigationent://SD_ILS/0/SD_ILS:2903282024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Alternate data storage forensicsent://SD_ILS/0/SD_ILS:1121442024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Schroader, Amber. Cohen, Tyler. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491631">http://www.sciencedirect.com/science/book/9781597491631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Carvey, Harlan A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kleiman, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital crime and forensic science in cyberspaceent://SD_ILS/0/SD_ILS:1348502024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kanellis, Panagiotis.<br/>Preferred Shelf Number HV6773 .D55 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1484882024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Maynor, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Avrupa konseyi siber suçlar sözleşmesi taslağı.ent://SD_ILS/0/SD_ILS:3877542024-12-22T18:10:25Z2024-12-22T18:10:25ZPreferred Shelf Number KJC8645.A5 A97 2006<br/>Format: Books<br/>Availability Law Library~1<br/>Cybercrime and societyent://SD_ILS/0/SD_ILS:3680782024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Yar, Majid.<br/>Preferred Shelf Number ONLINE(368078.1)<br/>Electronic Access SAGE knowledge <a href="http://sk.sagepub.com/books/cybercrime-and-society">http://sk.sagepub.com/books/cybercrime-and-society</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1122022024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Maynor, David. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Forensic computer crime investigationent://SD_ILS/0/SD_ILS:2885682024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Johnson, Thomas Alfred.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420028379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim suçları ve soruşturma-kovuşturma evrelerient://SD_ILS/0/SD_ILS:1154962024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Karagülmez, Ali.<br/>Preferred Shelf Number KKX4230 .K373 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Açıklamalı-içtihatlı tüm yönleriyle bilişim suçları ve Türk ceza kanunundaki uygulamasıent://SD_ILS/0/SD_ILS:1154982024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Kurt, Levent.<br/>Preferred Shelf Number KKX4230 .K878 2005<br/>Format: Books<br/>Availability Law Library~2<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:2536642024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber-crime : the challenge in Asiaent://SD_ILS/0/SD_ILS:2485232024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Broadhurst, Roderic G. Grabosky, Peter N., 1945-<br/>Preferred Shelf Number KNC982.C67 C93 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim hukukuent://SD_ILS/0/SD_ILS:3808882024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Topaloğlu, Mustafa<br/>Preferred Shelf Number KKX80.C65 T67 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Forensic computer crime investigationent://SD_ILS/0/SD_ILS:3428542024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Johnson, Thomas Alfred.<br/>Preferred Shelf Number ONLINE(342854.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466522602">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber crime investigator's field guideent://SD_ILS/0/SD_ILS:2848232024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Middleton, Bruce.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bilişim suçlarıent://SD_ILS/0/SD_ILS:1314732024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Dülger, Murat Volkan.<br/>Preferred Shelf Number KKX4230 D85 2004<br/>Format: Books<br/>Availability Law Library~2<br/>Inside the spam cartel trade secrets from the dark sideent://SD_ILS/0/SD_ILS:2540282024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Spammer-X. Sjouwerman, Stu. Posluns, Jeffrey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266863">http://www.sciencedirect.com/science/book/9781932266863</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adli bilişim (computer forensic)ent://SD_ILS/0/SD_ILS:3881572024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Berber, Leyla Keser.<br/>Preferred Shelf Number K564.C6 B47 2004<br/>Format: Books<br/>Availability Law Library~1<br/>Privacy & human rights : an international survey of privacy laws and developmentsent://SD_ILS/0/SD_ILS:3584512024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Electronic Privacy Information Center.<br/>Preferred Shelf Number K3264.C65 E54 2004<br/>Format: Books<br/>Availability Law Library~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Managing a network vulnerability assessmentent://SD_ILS/0/SD_ILS:2891852024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203503041">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:2536152024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Shinder, Debra Littlejohn. Tittel, Ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your identity in the information age protect your family on the internet!ent://SD_ILS/0/SD_ILS:2536172024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İnternet ve ceza hukukuent://SD_ILS/0/SD_ILS:1155652024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Sınar, Hasan.<br/>Preferred Shelf Number K564.C6 S563 2001<br/>Format: Books<br/>Availability Law Library~1<br/>Law in cyber spaceent://SD_ILS/0/SD_ILS:1346562024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Commonwealth Secretariat.<br/>Preferred Shelf Number K564.C6 L379 2001<br/>Format: Books<br/>Availability Law Library~1<br/>Investigating computer-related crimeent://SD_ILS/0/SD_ILS:2886982024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Stephenson, Peter.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420048872">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transnational criminal organizations, cybercrime, and money laundering a handbook for law enforcement officers, auditors, and financial investigatorsent://SD_ILS/0/SD_ILS:2895902024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Richards, James R., 1960-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420048728">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigating computer crimeent://SD_ILS/0/SD_ILS:2886462024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Clark, Franklin. Diliberto, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420048896">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Şahıslara ve mala karşı cürümler ve bilişim alanındaki suçlarent://SD_ILS/0/SD_ILS:5176072024-12-22T18:10:25Z2024-12-22T18:10:25ZAuthor Önder, Ayhan<br/>Preferred Shelf Number KKX4048 O53 1994<br/>Format: Books<br/>Availability Law Library~1<br/>