Search Results for Forensic Science. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dForensic$002bScience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-03-23T17:20:39Z Cyber Security and Digital Forensics Select Proceedings of the 2nd International Conference, ReDCySec 2024 ent://SD_ILS/0/SD_ILS:609816 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Roy, Nihar Ranjan. editor. (orcid)0000-0001-6581-0803&#160;Singh, Amit Prakash. editor. (orcid)0000-0002-8675-6903&#160;Kumar, Pradeep. editor.&#160;Kaul, Ajay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3284-8">https://doi.org/10.1007/978-981-96-3284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Digital Forensics A Guide to Theory, Research and Applications ent://SD_ILS/0/SD_ILS:602993 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;K&auml;vrestad, Joakim. author.&#160;Birath, Marcus. author. (orcid)0000-0001-5692-4008&#160;Clarke, Nathan. author. (orcid)0000-0002-3595-3800&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53649-6">https://doi.org/10.1007/978-3-031-53649-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Security Modern Trends and Challenges ent://SD_ILS/0/SD_ILS:603127 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Gountia, Debasis. editor. (orcid)0000-0002-9079-1074&#160;Dalei, Dilip Kumar. editor.&#160;Mishra, Subhankar. editor. (orcid)0000-0002-9910-7291&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0407-1">https://doi.org/10.1007/978-981-97-0407-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Face Recognition ent://SD_ILS/0/SD_ILS:602213 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;Deng, Jiankang. editor. (orcid)0000-0002-3709-6216&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43567-6">https://doi.org/10.1007/978-3-031-43567-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Digital Forensics Select Proceedings of the International Conference, ReDCySec 2023 ent://SD_ILS/0/SD_ILS:602845 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Roy, Nihar Ranjan. editor. (orcid)0000-0001-6581-0803&#160;Tanwar, Sudeep. editor.&#160;Batra, Usha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9811-1">https://doi.org/10.1007/978-981-99-9811-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:611692 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Mostafa Fouad, Mohamed. editor.&#160;Manaf, Azizah Abdul. editor.&#160;Zamani, Mazdak. editor.&#160;Ahmad, Rabiah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:615414 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Androulidakis, I.I. author.&#160;Kioupakis, Fragkiskos - Emmanouil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Network Forensics A Research Perspective ent://SD_ILS/0/SD_ILS:618148 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Joshi, R.C. author.&#160;Pilli, Emmanuel S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:614000 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:614393 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:615733 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2026-03-23T17:20:39Z 2026-03-23T17:20:39Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331279.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>