Search Results for Identity theft. - Narrowed by: English
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIdentity$002btheft.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026te$003dILS$0026ps$003d300?
2026-01-20T12:31:40Z
Financial Identity Theft Context, Challenges and Countermeasures
ent://SD_ILS/0/SD_ILS:205670
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author van der Meulen, Nicole S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-90-6704-814-9">http://dx.doi.org/10.1007/978-90-6704-814-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identity theft and fraud evaluating and managing risk
ent://SD_ILS/0/SD_ILS:243016
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Archer, Norman P. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780776619927/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Financial and Medical Identity Theft
ent://SD_ILS/0/SD_ILS:174049
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Camp, L. Jean. author. Johnson, M. Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Identity Theft: Avoidance, Causes and Possible Cures
ent://SD_ILS/0/SD_ILS:166606
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Camp, L. Jean. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Phishing and countermeasures understanding the increasing problem of electronic identity theft
ent://SD_ILS/0/SD_ILS:296875
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Jakobsson, Markus. Myers, Steven, 1975-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=18418">http://www.books24x7.com/marc.asp?bookid=18418</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470086106">http://dx.doi.org/10.1002/0470086106</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82196&ref=toc">http://www.myilibrary.com?id=82196&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and cybersecurity in healthcare
ent://SD_ILS/0/SD_ILS:599741
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Agrawal, Rashmi, editor.<br/>Preferred Shelf Number R859.7 .A78 A78 2025 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online social networks in business frameworks
ent://SD_ILS/0/SD_ILS:599413
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Rathi, Sudhir Kumar, editor. Keswani, Bright. Saxena, Rakesh Kumar. Kapoor, Sumit Kumar. Gupta, Sangita.<br/>Preferred Shelf Number HF5415.1265 .O55 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394231126">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394231126</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT)
ent://SD_ILS/0/SD_ILS:520255
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Gupta, Sunil. author. Sharma, Hitesh Kumar. author. Kapoor, Monit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-18896-1">https://doi.org/10.1007/978-3-031-18896-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of ICACTCE'23 - The International Conference on Advances in Communication Technology and Computer Engineering New Artificial Intelligence and the Internet of Things Based Perspective and Solutions
ent://SD_ILS/0/SD_ILS:529126
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Iwendi, Celestine. editor. Boulouard, Zakaria. editor. (orcid)0000-0002-4891-3760 Kryvinska, Natalia. editor. (orcid)0000-0003-3678-9229 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-37164-6">https://doi.org/10.1007/978-3-031-37164-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime during the SARS-CoV-2 pandemic (2019-2022)
ent://SD_ILS/0/SD_ILS:598517
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime : investigating high-technology computer crime
ent://SD_ILS/0/SD_ILS:544523
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Moore, Robert, 1976-, author.<br/>Preferred Shelf Number HV8079 .C65 M66 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315721767">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Protection, security, and safeguards : practical approaches and perspectives
ent://SD_ILS/0/SD_ILS:540408
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author June, Dale L.<br/>Preferred Shelf Number HV8290 .P758 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869543">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Identity thieves motives and methods
ent://SD_ILS/0/SD_ILS:242775
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Copes, Heith. Vieraitis, Lynne M. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781555537685/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Forensic human identification
ent://SD_ILS/0/SD_ILS:539374
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Thompson, Timothy (Timothy J. U.) Black, Sue M.<br/>Preferred Shelf Number RA1055 .F67 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420005714">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Stealing the network how to own an identity
ent://SD_ILS/0/SD_ILS:253663
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 2
ent://SD_ILS/0/SD_ILS:546290
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135484002">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The privacy papers : managing technology, consumer, employee, and legislative action
ent://SD_ILS/0/SD_ILS:539954
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author Herold, Rebecca.<br/>Preferred Shelf Number KF1262 .P754 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420000177">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Protection, security, and safeguards : practical approaches and perspectives
ent://SD_ILS/0/SD_ILS:542379
2026-01-20T12:31:40Z
2026-01-20T12:31:40Z
Author June, Dale L.<br/>Preferred Shelf Number HV8290 .P758 2000<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420041897">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>