Search Results for Internet fraud. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInternet$002bfraud.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-16T19:41:26Z Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Securing the Connected World Exploring Emerging Threats and Innovative Solutions ent://SD_ILS/0/SD_ILS:608011 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Thampi, Sabu M. editor. (orcid)0000-0001-6453-5520&#160;Thomas, Tony. editor. (orcid)0000-0002-9323-6607&#160;Mukherjee, Preetam. editor. (orcid)0000-0003-2549-6578&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82826-3">https://doi.org/10.1007/978-3-031-82826-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Delusive speech in the sharing economy : Scam Inc. ent://SD_ILS/0/SD_ILS:566835 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Reid, Julie Barbara Jane author.<br/>Preferred Shelf Number&#160;HV6773.15 .C56<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003513995">https://www.taylorfrancis.com/books/9781003513995</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and cybersecurity in healthcare ent://SD_ILS/0/SD_ILS:599741 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Agrawal, Rashmi, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78 A78 2025 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ITNG 2023 20th International Conference on Information Technology-New Generations ent://SD_ILS/0/SD_ILS:526966 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Latifi, Shahram. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28332-1">https://doi.org/10.1007/978-3-031-28332-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Data Engineering and Analytics Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022) ent://SD_ILS/0/SD_ILS:527309 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Bhateja, Vikrant. editor.&#160;Yang, Xin-She. editor.&#160;Chun-Wei Lin, Jerry. editor.&#160;Das, Ranjita. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7524-0">https://doi.org/10.1007/978-981-19-7524-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Science and Education 17th International Conference, ICCSE 2022, Ningbo, China, August 18-21, 2022, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:520318 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Hong, Wenxing. editor.&#160;Weng, Yang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2443-1">https://doi.org/10.1007/978-981-99-2443-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Corporate cybersecurity : identifying risks and the bug bounty program ent://SD_ILS/0/SD_ILS:596785 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number&#160;HD30.38 .J34 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning for healthcare applications ent://SD_ILS/0/SD_ILS:596667 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;R858 .M334 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792611">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792611</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern big data architectures : a multi-agent systems perspective ent://SD_ILS/0/SD_ILS:595932 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Ry&#380;ko, Dominik, author.<br/>Preferred Shelf Number&#160;QA76.9 .B45 R99 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119597926">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119597926</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Swarm, Evolutionary, and Memetic Computing 5th International Conference, SEMCCO 2014, Bhubaneswar, India, December 18-20, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519215 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Panigrahi, Bijaya Ketan. editor.&#160;Suganthan, Ponnuthurai Nagaratnam. editor.&#160;Das, Swagatam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-20294-5">https://doi.org/10.1007/978-3-319-20294-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:544523 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Moore, Robert, 1976-, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 M66 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315721767">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Siber su&ccedil;larin cezaland&#305;r&#305;lmas&#305; ve T&uuml;rkiye'de durum ent://SD_ILS/0/SD_ILS:135278 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Erg&uuml;n, &#304;smail.<br/>Preferred Shelf Number&#160;HV6773.3.T9 E738 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hack proofing your identity in the information age protect your family on the internet! ent://SD_ILS/0/SD_ILS:253617 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Bidwell, Teri.&#160;Cross, Michael, 1965-&#160;Russell, Ryan, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The e-business handbook ent://SD_ILS/0/SD_ILS:541399 2026-03-16T19:41:26Z 2026-03-16T19:41:26Z Author&#160;Lowry, Paul Benjamin.&#160;Cherrington, J. Owen.&#160;Watson, Ronald J.<br/>Preferred Shelf Number&#160;HF5548.32 .E174 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420025477">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>