Arama Sonu&ccedil;lar&#305; Computer security -- Case studies. - Daralt&#305;lm&#305;&#351;: Cryptology. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity$002b--$002bCase$002bstudies.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-28T12:19:44Z Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:613967 2026-03-28T12:19:44Z 2026-03-28T12:19:44Z Yazar&#160;Jakobsson, Markus. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:614393 2026-03-28T12:19:44Z 2026-03-28T12:19:44Z Yazar&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>