Arama Sonu&ccedil;lar&#305; Computer crimes. - Daralt&#305;lm&#305;&#351;: Computer crimes. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bcrimes.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue? 2024-09-20T15:48:28Z International encyclopaedia of laws : Cyber law ent://SD_ILS/0/SD_ILS:271183 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Dumortier, Jos, 1950-<br/>Yer Numaras&#305;&#160;REF K564.C6 C93 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:482971 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Brefeld, Ulf. editor.&#160;Curry, Edward. editor.&#160;Daly, Elizabeth. editor.&#160;MacNamee, Brian. editor. (orcid)0000-0003-2518-0274&#160;Marascu, Alice. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:483593 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Flammini, Francesco. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security ent://SD_ILS/0/SD_ILS:484201 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Pelton, Joseph N. author.&#160;Singh, Indu B. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28&ndash;29, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483478 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security ent://SD_ILS/0/SD_ILS:483947 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Cybenko, George. editor.&#160;Liu, Peng. editor.&#160;Wang, Cliff. editor.&#160;Wellman, Michael. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy Trends in the Industrial Internet of Things ent://SD_ILS/0/SD_ILS:486998 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, Le&oacute;n, Spain, September 4&ndash;6, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487006 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;P&eacute;rez Garc&iacute;a, Hilde. editor. (orcid)0000-0001-7112-1983&#160;S&aacute;nchez Gonz&aacute;lez, Lidia. editor. (orcid)0000-0002-0760-1170&#160;Castej&oacute;n Limas, Manuel. editor. (orcid)0000-0002-5152-4555&#160;Quinti&aacute;n Pardo, H&eacute;ctor. editor. (orcid)0000-0002-0268-7999&#160;Corchado Rodr&iacute;guez, Emilio. editor. (orcid)0000-0001-8560-3991<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime ent://SD_ILS/0/SD_ILS:483013 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485414 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Perdisci, Roberto. editor.&#160;Maurice, Cl&eacute;mentine. editor. (orcid)0000-0002-8896-9494&#160;Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017&#160;Almgren, Magnus. editor. (orcid)0000-0002-3383-9617&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyberdanger Understanding and Guarding Against Cybercrime ent://SD_ILS/0/SD_ILS:485936 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Willems, Eddy. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485944 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Cybenko, George. editor. (orcid)0000-0001-7734-2912&#160;Pym, David. editor. (orcid)0000-0002-6504-5838&#160;Fila, Barbara. editor. (orcid)0000-0002-1824-7621&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486312 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Yoo, Chang D. editor.&#160;Shi, Yun-Qing. editor.&#160;Kim, Hyoung Joong. editor.&#160;Piva, Alessandro. editor. (orcid)0000-0002-3047-0519&#160;Kim, Gwangsu. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:400943 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Bokhari, M. U. editor.&#160;Agrawal, Namrata. editor.&#160;Saini, Dharmendra. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:401736 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:399039 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Analyzing human behavior in cyberspace ent://SD_ILS/0/SD_ILS:481930 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Yan, Zheng, 1958- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Bili&#351;im su&ccedil;lar&#305; ent://SD_ILS/0/SD_ILS:384311 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Akarslan, H&uuml;seyin<br/>Yer Numaras&#305;&#160;KKX4230 A33 2015<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Bernik, Igor, author.<br/>Yer Numaras&#305;&#160;ONLINE(341980.1)<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:355450 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Shimonski, Robert.<br/>Yer Numaras&#305;&#160;ONLINE(355450.1)<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Social networking as a criminal enterprise ent://SD_ILS/0/SD_ILS:356354 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Marcum, Catherine Davis, 1980- editor.&#160;Higgins, George E., editor.<br/>Yer Numaras&#305;&#160;ONLINE(356354.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466589827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> G&uuml;ncel tehdit : siber su&ccedil;lar ent://SD_ILS/0/SD_ILS:517569 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Ocak, Mehmet Akif.&#160;&Ccedil;ak&#305;r, H&uuml;seyin.&#160;K&#305;l&#305;&ccedil;, Mehmet Serkan.<br/>Yer Numaras&#305;&#160;KKX80 C35 2014<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:260674 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Leman-Langlois, St&eacute;phane, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber power : crime, conflict and security in cyberspace ent://SD_ILS/0/SD_ILS:342598 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Ghernaouti-H&eacute;lie, Solange, 1958- author.<br/>Yer Numaras&#305;&#160;ONLINE(342598.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyberbullying prevention and response : expert perspectives ent://SD_ILS/0/SD_ILS:261362 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Patchin, Justin W., 1977-&#160;Hinduja, Sameer, 1978-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://www.tandfebooks.com/isbn/9780203818312">Click here to view</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:270436 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Jakobsson, Markus.<br/>Yer Numaras&#305;&#160;TK5105.875.I57 D43 2012<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:276700 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:241837 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber criminology exploring Internet crimes and criminal behavior ent://SD_ILS/0/SD_ILS:285180 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Jaishankar, K.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439829509">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime and espionage an analysis of subversive multi-vector threats ent://SD_ILS/0/SD_ILS:147518 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Gragido, Will.&#160;Pirc, John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Criminals on Trial ent://SD_ILS/0/SD_ILS:238550 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Smith, Russell G..&#160;Grabosky, Peter.&#160;Urbas, Gregor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511481604">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Carvey, Harlan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Principles of cybercrime ent://SD_ILS/0/SD_ILS:277995 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Clough, Jonathan.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber-bullying : issues and solutions for the school, the classroom and the home ent://SD_ILS/0/SD_ILS:312071 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Shariff, Shaheen.<br/>Yer Numaras&#305;&#160;LB3013.3 S467 2010<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cyber kids, cyber bullying, cyber balance ent://SD_ILS/0/SD_ILS:312330 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Trolley, Barbara (Barbara C.)&#160;Hanel, Constance.<br/>Yer Numaras&#305;&#160;LB3013.3 T76 2010<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber fraud tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:291467 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Graham, James.&#160;Howard, Rick.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:134036 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Britz, Marjie.<br/>Yer Numaras&#305;&#160;QA76.9.A25 B77 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cyber bullying : protecting kids and adults from online bullies ent://SD_ILS/0/SD_ILS:134816 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;McQuade, Samuel C.&#160;Colt, James P.&#160;Meyer, Nancy B. B.<br/>Yer Numaras&#305;&#160;HV6773 .M395 2009<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:291349 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Brancik, Kenneth C.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:112206 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Kleiman, Dave.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:148388 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Kleiman, Dave.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime and society ent://SD_ILS/0/SD_ILS:368078 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Yar, Majid.<br/>Yer Numaras&#305;&#160;ONLINE(368078.1)<br/>Elektronik Eri&#351;im&#160;SAGE knowledge <a href="http://sk.sagepub.com/books/cybercrime-and-society">http://sk.sagepub.com/books/cybercrime-and-society</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital crime and forensic science in cyberspace ent://SD_ILS/0/SD_ILS:134850 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Kanellis, Panagiotis.<br/>Yer Numaras&#305;&#160;HV6773 .D55 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:253664 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Craig, Paul.&#160;Honick, Ron.&#160;Burnett, Mark (Mark M.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Black Hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:254025 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Miller, Drew, 1978-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Inside the spam cartel trade secrets from the dark side ent://SD_ILS/0/SD_ILS:254028 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Spammer-X.&#160;Sjouwerman, Stu.&#160;Posluns, Jeffrey.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266863">http://www.sciencedirect.com/science/book/9781932266863</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Yer Numaras&#305;&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Privacy &amp; human rights : an international survey of privacy laws and developments ent://SD_ILS/0/SD_ILS:358451 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Electronic Privacy Information Center.<br/>Yer Numaras&#305;&#160;K3264.C65 E54 2004<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Hack proofing your identity in the information age protect your family on the internet! ent://SD_ILS/0/SD_ILS:253617 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Bidwell, Teri.&#160;Cross, Michael, 1965-&#160;Russell, Ryan, 1969-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> &#304;nternet ve ceza hukuku ent://SD_ILS/0/SD_ILS:115565 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;S&#305;nar, Hasan.<br/>Yer Numaras&#305;&#160;K564.C6 S563 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Law in cyber space ent://SD_ILS/0/SD_ILS:134656 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Commonwealth Secretariat.<br/>Yer Numaras&#305;&#160;K564.C6 L379 2001<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/> Transnational criminal organizations, cybercrime, and money laundering a handbook for law enforcement officers, auditors, and financial investigators ent://SD_ILS/0/SD_ILS:289590 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;Richards, James R., 1960-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420048728">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> &#350;ah&#305;slara ve mala kar&#351;&#305; c&uuml;r&uuml;mler ve bili&#351;im alan&#305;ndaki su&ccedil;lar ent://SD_ILS/0/SD_ILS:517607 2024-09-20T15:48:28Z 2024-09-20T15:48:28Z Yazar&#160;&Ouml;nder, Ayhan<br/>Yer Numaras&#305;&#160;KKX4048 O53 1994<br/>Format:&#160;Kitap<br/>Durum&#160;Hukuk K&uuml;t&uuml;phanesi~1<br/>