Search Results for Cyberterrorism. - Narrowed by: Online LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyberterrorism.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026ic$003dtrue$0026ps$003d300?2024-11-06T00:43:53ZCyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:4882432024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Chen, Thomas M. editor. Jarvis, Lee. editor. Macdonald, Stuart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurityent://SD_ILS/0/SD_ILS:5201792024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Montasari, Reza. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520179.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applications for Artificial Intelligence and Digital Forensics in National Securityent://SD_ILS/0/SD_ILS:5206052024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Montasari, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520605.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40118-3">https://doi.org/10.1007/978-3-031-40118-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applying methods of scientific inquiry into intelligence, security, and counterterrorisment://SD_ILS/0/SD_ILS:4822482024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Sari, Arif, 1986- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Utilization of new technologies in global terror : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4822372024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Stacey, Emily, 1984- author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Gurevich, Vladimir, 1956- author.<br/>Preferred Shelf Number ONLINE(356535.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Warfare and the Laws of Warent://SD_ILS/0/SD_ILS:2373932024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Harrison Dinniss, Heather.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511894527">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber challenges and national security threats, opportunities, and power in a virtual worldent://SD_ILS/0/SD_ILS:2425132024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Reveron, Derek S. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781589019195/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber attacks protecting national infrastructureent://SD_ILS/0/SD_ILS:1475062024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Amoroso, Edward G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Science and technology of terrorism and counterterrorisment://SD_ILS/0/SD_ILS:2862792024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Ghosh, Tushar K., Dr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-11-06T00:43:53Z2024-11-06T00:43:53ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>