Search Results for Security -- Technology. - Narrowed by: Computer crimes.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002b--$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ic$003dtrue$0026ps$003d300?
2025-12-29T14:33:48Z
Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security
ent://SD_ILS/0/SD_ILS:484201
2025-12-29T14:33:48Z
2025-12-29T14:33:48Z
Author Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI Embedded Assurance for Cyber Systems
ent://SD_ILS/0/SD_ILS:528935
2025-12-29T14:33:48Z
2025-12-29T14:33:48Z
Author Wang, Cliff. editor. Iyengar, S.S. editor. Sun, Kun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:544396
2025-12-29T14:33:48Z
2025-12-29T14:33:48Z
Author Brancik, Kenneth C., author.<br/>Preferred Shelf Number QA76.9 .A25 B725 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>