Search Results for Cyberterrorism. - Narrowed by: Cyberterrorism.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCyberterrorism.$0026qf$003dSUBJECT$002509Subject$002509Cyberterrorism.$002509Cyberterrorism.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-01-01T00:17:42ZElektronik harpent://SD_ILS/0/SD_ILS:5143482025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Utilization of new technologies in global terror : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4822372025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Stacey, Emily, 1984- author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Gurevich, Vladimir, 1956- author.<br/>Preferred Shelf Number ONLINE(356535.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber challenges and national security threats, opportunities, and power in a virtual worldent://SD_ILS/0/SD_ILS:2425132025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Reveron, Derek S. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781589019195/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Warfare and the Laws of Warent://SD_ILS/0/SD_ILS:2373932025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Harrison Dinniss, Heather.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511894527">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562025-01-01T00:17:42Z2025-01-01T00:17:42ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>