Search Results for Cyberterrorism. - Narrowed by: Electronic LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyberterrorism.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-01-01T01:11:48ZCyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:4882432025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Chen, Thomas M. editor. Jarvis, Lee. editor. Macdonald, Stuart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurityent://SD_ILS/0/SD_ILS:5201792025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Montasari, Reza. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520179.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applications for Artificial Intelligence and Digital Forensics in National Securityent://SD_ILS/0/SD_ILS:5206052025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Montasari, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520605.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40118-3">https://doi.org/10.1007/978-3-031-40118-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applying methods of scientific inquiry into intelligence, security, and counterterrorisment://SD_ILS/0/SD_ILS:4822482025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Sari, Arif, 1986- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Utilization of new technologies in global terror : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4822372025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Stacey, Emily, 1984- author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Gurevich, Vladimir, 1956- author.<br/>Preferred Shelf Number ONLINE(356535.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber challenges and national security threats, opportunities, and power in a virtual worldent://SD_ILS/0/SD_ILS:2425132025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Reveron, Derek S. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781589019195/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Warfare and the Laws of Warent://SD_ILS/0/SD_ILS:2373932025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Harrison Dinniss, Heather.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511894527">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber attacks protecting national infrastructureent://SD_ILS/0/SD_ILS:1475062025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Amoroso, Edward G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Science and technology of terrorism and counterterrorisment://SD_ILS/0/SD_ILS:2862792025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Ghosh, Tushar K., Dr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902025-01-01T01:11:48Z2025-01-01T01:11:48ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>