Search Results for Information security - Narrowed by: Computer crimes. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2026-03-21T23:22:22Z Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversarial Multimedia Forensics ent://SD_ILS/0/SD_ILS:602781 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Nowroozi, Ehsan. editor. (orcid)0000-0002-5714-8378&#160;Kallas, Kassem. editor.&#160;Jolfaei, Alireza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-49803-9">https://doi.org/10.1007/978-3-031-49803-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices ent://SD_ILS/0/SD_ILS:553601 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings ent://SD_ILS/0/SD_ILS:608908 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Pra&ccedil;a, Isabel. editor. (orcid)0000-0002-2519-9859&#160;Bernardi, Simona. editor. (orcid)0000-0002-2605-6243&#160;In&aacute;cio, Pedro R.M. editor. (orcid)0000-0001-8221-0666&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Shakedown The Complete Guide to Understanding and Combating Ransomware ent://SD_ILS/0/SD_ILS:604673 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Halikias, Harry. author. (orcid)0009-0005-2072-4705&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65438-1">https://doi.org/10.1007/978-3-031-65438-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Malware Offensive and Defensive Systems ent://SD_ILS/0/SD_ILS:602026 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Almomani, Iman. editor.&#160;Maglaras, Leandros A. editor.&#160;Ferrag, Mohamed Amine. editor.&#160;Ayres, Nick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age ent://SD_ILS/0/SD_ILS:603456 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Kestner, Peter. author. (orcid)0009-0002-0437-9487&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cyber risk handbook : creating and measuring effective cybersecurity capabilities ent://SD_ILS/0/SD_ILS:593609 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Antonucci, Domenic, author.<br/>Preferred Shelf Number&#160;HV6773 .A58 2017<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:610784 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Thames, Lane. editor.&#160;Schaefer, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50660-9">https://doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World&reg;, Florida, USA ent://SD_ILS/0/SD_ILS:612286 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2026-03-21T23:22:22Z 2026-03-21T23:22:22Z Author&#160;Brancik, Kenneth C., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B725 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>