Search Results for Cyberspace. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyberspace.$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-20T21:55:05Z Conflicts, crimes and regulations in cyberspace ent://SD_ILS/0/SD_ILS:597281 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Laurent, S&eacute;bastien, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-physical systems for innovating and transforming society 5.0 ent://SD_ILS/0/SD_ILS:599807 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Preferred Shelf Number&#160;T14.5 .C93 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic communication interception technologies and issues of power ent://SD_ILS/0/SD_ILS:598620 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Ventre, Daniel, author.&#160;Guillot, Philippe, author.<br/>Preferred Shelf Number&#160;TK7882 .E2 V46 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394236725">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394236725</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security designs for the cloud, IoT, and social networking ent://SD_ILS/0/SD_ILS:595493 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Bhatt, Chintan M., 1988- editor.&#160;Madhukar, Mani, editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Darknet : geopolitics and uses ent://SD_ILS/0/SD_ILS:594484 2026-03-20T21:55:05Z 2026-03-20T21:55:05Z Author&#160;Gayard, Laurent, author.<br/>Preferred Shelf Number&#160;TK5105.875 .I57<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119425502">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119425502</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>