Search Results for Who - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dWho$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-10-31T14:20:09ZStealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-10-31T14:20:09Z2024-10-31T14:20:09ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-10-31T14:20:09Z2024-10-31T14:20:09ZAuthor Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Profiling hackers the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:2914122024-10-31T14:20:09Z2024-10-31T14:20:09ZAuthor Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>