Search Results for Data protection - Narrowed by: Computer crimes. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300?dt=list 2026-03-29T03:33:10Z The Implication of Cyberattacks on Big Data and How to Mitigate the Risk ent://SD_ILS/0/SD_ILS:608189 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Alaba, Fadele Ayotunde. author.&#160;Rocha, Alvaro. author. (orcid)0000-0002-0750-8187&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-88570-9">https://doi.org/10.1007/978-3-031-88570-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings ent://SD_ILS/0/SD_ILS:608908 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Pra&ccedil;a, Isabel. editor. (orcid)0000-0002-2519-9859&#160;Bernardi, Simona. editor. (orcid)0000-0002-2605-6243&#160;In&aacute;cio, Pedro R.M. editor. (orcid)0000-0001-8221-0666&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age ent://SD_ILS/0/SD_ILS:603456 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Kestner, Peter. author. (orcid)0009-0002-0437-9487&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Malware Offensive and Defensive Systems ent://SD_ILS/0/SD_ILS:602026 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Almomani, Iman. editor.&#160;Maglaras, Leandros A. editor.&#160;Ferrag, Mohamed Amine. editor.&#160;Ayres, Nick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Shakedown The Complete Guide to Understanding and Combating Ransomware ent://SD_ILS/0/SD_ILS:604673 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Halikias, Harry. author. (orcid)0009-0005-2072-4705&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65438-1">https://doi.org/10.1007/978-3-031-65438-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:483593 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Flammini, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security ent://SD_ILS/0/SD_ILS:484201 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Pelton, Joseph N. author.&#160;Singh, Indu B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:610784 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Thames, Lane. editor.&#160;Schaefer, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50660-9">https://doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World&reg;, Florida, USA ent://SD_ILS/0/SD_ILS:612286 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:270436 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Jakobsson, Markus.<br/>Preferred Shelf Number&#160;TK5105.875.I57 D43 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Privacy &amp; human rights : an international survey of privacy laws and developments ent://SD_ILS/0/SD_ILS:358451 2026-03-29T03:33:10Z 2026-03-29T03:33:10Z Author&#160;Electronic Privacy Information Center.<br/>Preferred Shelf Number&#160;K3264.C65 E54 2004<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/>