Search Results for Protection. - Narrowed by: Computer crimes.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dProtection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026te$003dILS$0026ps$003d300?2025-12-24T19:19:41ZResilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4835932025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Securityent://SD_ILS/0/SD_ILS:4842012025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4842752025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4838082025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber law, privacy, and security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4822392025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:3989662025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Privacy & human rights : an international survey of privacy laws and developmentsent://SD_ILS/0/SD_ILS:3584512025-12-24T19:19:41Z2025-12-24T19:19:41ZAuthor Electronic Privacy Information Center.<br/>Preferred Shelf Number K3264.C65 E54 2004<br/>Format: Books<br/>Availability Law Library~1<br/>