Search Results for Cyberterrorism.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyberterrorism.$0026pe$003dd$00253A$0026ps$003d300$0026isd$003dtrue?dt=list2025-01-03T22:25:23ZCyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:4882432025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Chen, Thomas M. editor. Jarvis, Lee. editor. Macdonald, Stuart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurityent://SD_ILS/0/SD_ILS:5201792025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Montasari, Reza. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520179.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applications for Artificial Intelligence and Digital Forensics in National Securityent://SD_ILS/0/SD_ILS:5206052025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Montasari, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520605.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40118-3">https://doi.org/10.1007/978-3-031-40118-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Elektronik harpent://SD_ILS/0/SD_ILS:5143482025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Utilization of new technologies in global terror : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4822372025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Stacey, Emily, 1984- author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applying methods of scientific inquiry into intelligence, security, and counterterrorisment://SD_ILS/0/SD_ILS:4822482025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Sari, Arif, 1986- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Gurevich, Vladimir, 1956- author.<br/>Preferred Shelf Number ONLINE(356535.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategic intelligence management : national security imperatives and information and communications technologiesent://SD_ILS/0/SD_ILS:2703632025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cyber challenges and national security threats, opportunities, and power in a virtual worldent://SD_ILS/0/SD_ILS:2425132025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Reveron, Derek S. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781589019195/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Warfare and the Laws of Warent://SD_ILS/0/SD_ILS:2373932025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Harrison Dinniss, Heather.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511894527">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber attacks protecting national infrastructureent://SD_ILS/0/SD_ILS:1475062025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Amoroso, Edward G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Science and technology of terrorism and counterterrorisment://SD_ILS/0/SD_ILS:2862792025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Ghosh, Tushar K., Dr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Terror on the Internet : the new arena, the new challengesent://SD_ILS/0/SD_ILS:1059802025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Weimann, Gabriel.<br/>Preferred Shelf Number HV 6431 .W435 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902025-01-03T22:25:23Z2025-01-03T22:25:23ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>