Arama Sonuçları Cyberspace. - Daraltılmış: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCyberspace.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300?dt=list
2026-03-20T21:50:02Z
Conflicts, crimes and regulations in cyberspace
ent://SD_ILS/0/SD_ILS:597281
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Laurent, Sébastien, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber-physical systems for innovating and transforming society 5.0
ent://SD_ILS/0/SD_ILS:599807
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yer Numarası T14.5 .C93 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197750</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Electronic communication interception technologies and issues of power
ent://SD_ILS/0/SD_ILS:598620
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Ventre, Daniel, author. Guillot, Philippe, author.<br/>Yer Numarası TK7882 .E2 V46 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394236725">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394236725</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Lee, Martin (Computer security expert), author.<br/>Yer Numarası TK5105.59 .L47 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Fréminville, Marie de, author.<br/>Yer Numarası HF5548.37 .F74 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security designs for the cloud, IoT, and social networking
ent://SD_ILS/0/SD_ILS:595493
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Le, Dac-Nhuong, 1983- editor. Bhatt, Chintan M., 1988- editor. Madhukar, Mani, editor.<br/>Yer Numarası QA76.585<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Darknet : geopolitics and uses
ent://SD_ILS/0/SD_ILS:594484
2026-03-20T21:50:02Z
2026-03-20T21:50:02Z
Yazar Gayard, Laurent, author.<br/>Yer Numarası TK5105.875 .I57<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119425502">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119425502</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>