Search Results for Legal methodology - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dLegal$002bmethodology$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-03-12T06:05:48Z
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-03-12T06:05:48Z
2026-03-12T06:05:48Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-03-12T06:05:48Z
2026-03-12T06:05:48Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>