Search Results for Cyberterrorism -- Prevention. - Narrowed by: Online LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyberterrorism$002b--$002bPrevention.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026ps$003d300?2024-11-06T13:13:48ZNational security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-06T13:13:48Z2024-11-06T13:13:48ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applying methods of scientific inquiry into intelligence, security, and counterterrorisment://SD_ILS/0/SD_ILS:4822482024-11-06T13:13:48Z2024-11-06T13:13:48ZAuthor Sari, Arif, 1986- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322024-11-06T13:13:48Z2024-11-06T13:13:48ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122024-11-06T13:13:48Z2024-11-06T13:13:48ZAuthor Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber attacks protecting national infrastructureent://SD_ILS/0/SD_ILS:1475062024-11-06T13:13:48Z2024-11-06T13:13:48ZAuthor Amoroso, Edward G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-06T13:13:48Z2024-11-06T13:13:48ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>