Arama Sonu&ccedil;lar&#305; Computer crimes. - Daralt&#305;lm&#305;&#351;: System safety. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bcrimes.$0026qf$003dSUBJECT$002509Konu$002509System$002bsafety.$002509System$002bsafety.$0026ps$003d300?dt=list 2025-03-19T16:12:19Z Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2025-03-19T16:12:19Z 2025-03-19T16:12:19Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2025-03-19T16:12:19Z 2025-03-19T16:12:19Z Yazar&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2025-03-19T16:12:19Z 2025-03-19T16:12:19Z Yazar&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>