Search Results for Forensic sciences - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dForensic$002bsciences$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-31T08:14:06Z Cyber Security and Digital Forensics Select Proceedings of the 2nd International Conference, ReDCySec 2024 ent://SD_ILS/0/SD_ILS:609816 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;Roy, Nihar Ranjan. editor. (orcid)0000-0001-6581-0803&#160;Singh, Amit Prakash. editor. (orcid)0000-0002-8675-6903&#160;Kumar, Pradeep. editor.&#160;Kaul, Ajay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3284-8">https://doi.org/10.1007/978-981-96-3284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Face Recognition ent://SD_ILS/0/SD_ILS:602213 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;Deng, Jiankang. editor. (orcid)0000-0002-3709-6216&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43567-6">https://doi.org/10.1007/978-3-031-43567-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Digital Forensics Select Proceedings of the International Conference, ReDCySec 2023 ent://SD_ILS/0/SD_ILS:602845 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;Roy, Nihar Ranjan. editor. (orcid)0000-0001-6581-0803&#160;Tanwar, Sudeep. editor.&#160;Batra, Usha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9811-1">https://doi.org/10.1007/978-981-99-9811-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Digital Forensics A Guide to Theory, Research and Applications ent://SD_ILS/0/SD_ILS:602993 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;K&auml;vrestad, Joakim. author.&#160;Birath, Marcus. author. (orcid)0000-0001-5692-4008&#160;Clarke, Nathan. author. (orcid)0000-0002-3595-3800&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53649-6">https://doi.org/10.1007/978-3-031-53649-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:615414 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;Androulidakis, I.I. author.&#160;Kioupakis, Fragkiskos - Emmanouil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:614000 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:615733 2026-03-31T08:14:06Z 2026-03-31T08:14:06Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>