Arama Sonuçları Cyberterrorism. - Daraltılmış: Çevrimiçi KütüphaneSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCyberterrorism.$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253AONLINE$002509$0025C3$002587evrimi$0025C3$0025A7i$002bK$0025C3$0025BCt$0025C3$0025BCphane$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-23T03:34:01ZCyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:4882432024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Chen, Thomas M. editor. Jarvis, Lee. editor. Macdonald, Stuart. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurityent://SD_ILS/0/SD_ILS:5201792024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Montasari, Reza. author. SpringerLink (Online service)<br/>Yer Numarası XX(520179.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applications for Artificial Intelligence and Digital Forensics in National Securityent://SD_ILS/0/SD_ILS:5206052024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Montasari, Reza. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520605.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-40118-3">https://doi.org/10.1007/978-3-031-40118-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developments in information security and cybernetic warsent://SD_ILS/0/SD_ILS:4821872024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar IGI Global, publisher. Information Resources Management Association, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applying methods of scientific inquiry into intelligence, security, and counterterrorisment://SD_ILS/0/SD_ILS:4822482024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Sari, Arif, 1986- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Utilization of new technologies in global terror : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4822372024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Stacey, Emily, 1984- author. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber and electromagnetic threats in modern relay protectionent://SD_ILS/0/SD_ILS:3565352024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Gurevich, Vladimir, 1956- author.<br/>Yer Numarası ONLINE(356535.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Warfare and the Laws of Warent://SD_ILS/0/SD_ILS:2373932024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Harrison Dinniss, Heather.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511894527">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber challenges and national security threats, opportunities, and power in a virtual worldent://SD_ILS/0/SD_ILS:2425132024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Reveron, Derek S. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9781589019195/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber attacks protecting national infrastructureent://SD_ILS/0/SD_ILS:1475062024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Amoroso, Edward G.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Demchak, Chris C. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Science and technology of terrorism and counterterrorisment://SD_ILS/0/SD_ILS:2862792024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Ghosh, Tushar K., Dr.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The counterterrorism handbook tactics, procedures, and techniquesent://SD_ILS/0/SD_ILS:2868622024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Bolz, Frank, 1930- Dudonis, Kenneth J. Schulz, David P.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar Erbschloe, Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902024-11-23T03:34:01Z2024-11-23T03:34:01ZYazar 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>