Search Results for Data protection. - Narrowed by: Online Library - Computer crimes.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue?dt=list
2024-11-20T04:02:37Z
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2024-11-20T04:02:37Z
2024-11-20T04:02:37Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of War for Computer Security
ent://SD_ILS/0/SD_ILS:483808
2024-11-20T04:02:37Z
2024-11-20T04:02:37Z
Author Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security
ent://SD_ILS/0/SD_ILS:484201
2024-11-20T04:02:37Z
2024-11-20T04:02:37Z
Author Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber law, privacy, and security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482239
2024-11-20T04:02:37Z
2024-11-20T04:02:37Z
Author IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2024-11-20T04:02:37Z
2024-11-20T04:02:37Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2024-11-20T04:02:37Z
2024-11-20T04:02:37Z
Author Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>