Search Results for Evidence. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dEvidence.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300? 2026-02-20T15:37:08Z Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence ent://SD_ILS/0/SD_ILS:594530 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Furneaux, Nick, author.&#160;Knottenbelt, William J., writer of foreword.<br/>Preferred Shelf Number&#160;HV8079 .C65 F87 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> File system forensics ent://SD_ILS/0/SD_ILS:599730 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Toolan, Fergus.<br/>Preferred Shelf Number&#160;QA76.9 .D348 T66 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394289820">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394289820</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cyber intelligence : a hands-on guide to digital forensics ent://SD_ILS/0/SD_ILS:599262 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 J633 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence-enabled blockchain technology and digital twin for smart hospitals ent://SD_ILS/0/SD_ILS:599395 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;RA976 .A78 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287420">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287420</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolving software processes : trends and future directions ent://SD_ILS/0/SD_ILS:597323 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Khan, Arif Ali, editor.&#160;Le, Dac-Nhuong, 1983- editor.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119821779</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber breach response that actually works : organizational approach to managing residual risk ent://SD_ILS/0/SD_ILS:596117 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Gorecki, Andrew.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-02-20T15:37:08Z 2026-02-20T15:37:08Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>