Search Results for Safety. - Narrowed by: Computer crimes.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSafety.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ic$003dtrue$0026ps$003d300?
2025-12-25T18:28:56Z
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Author Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of War for Computer Security
ent://SD_ILS/0/SD_ILS:483808
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Author Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep Learning Applications for Cyber Security
ent://SD_ILS/0/SD_ILS:486694
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Author Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704 Tang, MingJian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Trends in the Industrial Internet of Things
ent://SD_ILS/0/SD_ILS:486998
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Author Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social networking as a criminal enterprise
ent://SD_ILS/0/SD_ILS:544427
2025-12-25T18:28:56Z
2025-12-25T18:28:56Z
Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429254789">https://www.taylorfrancis.com/books/9780429254789</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>