Search Results for System security. - Narrowed by: Computer crimes. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystem$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2025-12-31T11:47:35Z Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies ent://SD_ILS/0/SD_ILS:528401 2025-12-31T11:47:35Z 2025-12-31T11:47:35Z Author&#160;Abd El-Latif, Ahmed A. editor.&#160;Maleh, Yassine. editor.&#160;Mazurczyk, Wojciech. editor.&#160;ELAffendi, Mohammed. editor.&#160;I. Alkanhal, Mohamed. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21101-0">https://doi.org/10.1007/978-3-031-21101-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI Embedded Assurance for Cyber Systems ent://SD_ILS/0/SD_ILS:528935 2025-12-31T11:47:35Z 2025-12-31T11:47:35Z Author&#160;Wang, Cliff. editor.&#160;Iyengar, S.S. editor.&#160;Sun, Kun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2025-12-31T11:47:35Z 2025-12-31T11:47:35Z Author&#160;Brancik, Kenneth C., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B725 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>