Search Results for Security. - Narrowed by: Computer crimes.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue?
2024-11-07T23:31:34Z
Deep Learning Applications for Cyber Security
ent://SD_ILS/0/SD_ILS:486694
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704 Tang, MingJian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Proceedings of CSI 2015
ent://SD_ILS/0/SD_ILS:400943
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Bokhari, M. U. editor. Agrawal, Namrata. editor. Saini, Dharmendra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483391
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security
ent://SD_ILS/0/SD_ILS:483947
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Cybenko, George. editor. Liu, Peng. editor. Wang, Cliff. editor. Wellman, Michael. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484061
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485944
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Cybenko, George. editor. (orcid)0000-0001-7734-2912 Pym, David. editor. (orcid)0000-0002-6504-5838 Fila, Barbara. editor. (orcid)0000-0002-1824-7621 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of War for Computer Security
ent://SD_ILS/0/SD_ILS:483808
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Black Hat physical device security exploiting hardware and software
ent://SD_ILS/0/SD_ILS:254025
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Trends in the Industrial Internet of Things
ent://SD_ILS/0/SD_ILS:486998
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber law, privacy, and security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482239
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security
ent://SD_ILS/0/SD_ILS:484201
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber power : crime, conflict and security in cyberspace
ent://SD_ILS/0/SD_ILS:342598
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Ghernaouti-Hélie, Solange, 1958- author.<br/>Preferred Shelf Number ONLINE(342598.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485414
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Perdisci, Roberto. editor. Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494 Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017 Almgren, Magnus. editor. (orcid)0000-0002-3383-9617 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:486312
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Yoo, Chang D. editor. Shi, Yun-Qing. editor. Kim, Hyoung Joong. editor. Piva, Alessandro. editor. (orcid)0000-0002-3047-0519 Kim, Gwangsu. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction
ent://SD_ILS/0/SD_ILS:483593
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:482971
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Brefeld, Ulf. editor. Curry, Edward. editor. Daly, Elizabeth. editor. MacNamee, Brian. editor. (orcid)0000-0003-2518-0274 Marascu, Alice. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483478
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime
ent://SD_ILS/0/SD_ILS:483013
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA
ent://SD_ILS/0/SD_ILS:399039
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Nicholson, Denise. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria
ent://SD_ILS/0/SD_ILS:401736
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introductory Computer Forensics A Hands-on Practical Approach
ent://SD_ILS/0/SD_ILS:398966
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and cyberwarfare
ent://SD_ILS/0/SD_ILS:341980
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber reconnaissance, surveillance, and defense
ent://SD_ILS/0/SD_ILS:355450
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Technocrime, policing and surveillance
ent://SD_ILS/0/SD_ILS:260674
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Leman-Langlois, Stéphane, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:241837
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The death of the Internet
ent://SD_ILS/0/SD_ILS:270436
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:276700
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and espionage an analysis of subversive multi-vector threats
ent://SD_ILS/0/SD_ILS:147518
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Gragido, Will. Pirc, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:134036
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Britz, Marjie.<br/>Preferred Shelf Number QA76.9.A25 B77 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cyber fraud tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:291467
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Graham, James. Howard, Rick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Profiling hackers the science of criminal profiling as applied to the world of hacking
ent://SD_ILS/0/SD_ILS:291412
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:291349
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Brancik, Kenneth C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.
ent://SD_ILS/0/SD_ILS:112206
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Kleiman, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.
ent://SD_ILS/0/SD_ILS:148388
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stealing the network how to own an identity
ent://SD_ILS/0/SD_ILS:253663
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software piracy exposed
ent://SD_ILS/0/SD_ILS:253664
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hack proofing your identity in the information age protect your family on the internet!
ent://SD_ILS/0/SD_ILS:253617
2024-11-07T23:31:34Z
2024-11-07T23:31:34Z
Author Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>