Search Results for Security Science and Technology. - Narrowed by: Computer crimes. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bScience$002band$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300?dt=list 2026-03-20T22:05:58Z Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings ent://SD_ILS/0/SD_ILS:608908 2026-03-20T22:05:58Z 2026-03-20T22:05:58Z Author&#160;Pra&ccedil;a, Isabel. editor. (orcid)0000-0002-2519-9859&#160;Bernardi, Simona. editor. (orcid)0000-0002-2605-6243&#160;In&aacute;cio, Pedro R.M. editor. (orcid)0000-0001-8221-0666&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-03-20T22:05:58Z 2026-03-20T22:05:58Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Malware Offensive and Defensive Systems ent://SD_ILS/0/SD_ILS:602026 2026-03-20T22:05:58Z 2026-03-20T22:05:58Z Author&#160;Almomani, Iman. editor.&#160;Maglaras, Leandros A. editor.&#160;Ferrag, Mohamed Amine. editor.&#160;Ayres, Nick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-20T22:05:58Z 2026-03-20T22:05:58Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-03-20T22:05:58Z 2026-03-20T22:05:58Z Author&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>