Arama Sonu&ccedil;lar&#305; Crime - Daralt&#305;lm&#305;&#351;: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCrime$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS.$002509COMPUTERS.$0026ic$003dtrue$0026ps$003d300? 2026-03-02T17:33:42Z BEHIND THE AI MASK protecting your business from deepfakes. ent://SD_ILS/0/SD_ILS:600411 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;BOGAN, CARL.<br/>Yer Numaras&#305;&#160;XX(600411.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352616</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Meta-heuristic algorithms for advanced distributed systems ent://SD_ILS/0/SD_ILS:598999 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Anand, Rohit, editor.&#160;Juneja, Abhinav, editor.&#160;Pandey, Digvijay, editor.&#160;Juneja, Sapna, editor.&#160;Sindhwani, Nidhi, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .D5 M497 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188093">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188093</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Couretas, Jerry M., 1966- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Lee, Martin (Computer security expert), author.<br/>Yer Numaras&#305;&#160;TK5105.59 .L47 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Yer Numaras&#305;&#160;HV6431 .I58 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine learning for healthcare applications ent://SD_ILS/0/SD_ILS:596667 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Mohanty, Sachi Nandan, editor.<br/>Yer Numaras&#305;&#160;R858 .M334 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792611">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792611</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Schneier, Bruce, 1963- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S36 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-03-02T17:33:42Z 2026-03-02T17:33:42Z Yazar&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>