Arama Sonu&ccedil;lar&#305; Cyberterrorism. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCyberterrorism.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-25T13:31:36Z Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:488243 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Chen, Thomas M. editor.&#160;Jarvis, Lee. editor.&#160;Macdonald, Stuart. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity ent://SD_ILS/0/SD_ILS:520179 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520179.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications for Artificial Intelligence and Digital Forensics in National Security ent://SD_ILS/0/SD_ILS:520605 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Montasari, Reza. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520605.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-40118-3">https://doi.org/10.1007/978-3-031-40118-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Elektronik harp ent://SD_ILS/0/SD_ILS:514348 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Pakfiliz, Ahmet G&uuml;ng&ouml;r.<br/>Yer Numaras&#305;&#160;UG485 P35 2021<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> National security : breakthroughs in research and practice ent://SD_ILS/0/SD_ILS:482109 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Developments in information security and cybernetic wars ent://SD_ILS/0/SD_ILS:482187 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Sarfraz, Muhammad, editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Utilization of new technologies in global terror : emerging research and opportunities ent://SD_ILS/0/SD_ILS:482237 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Stacey, Emily, 1984- author.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8876-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applying methods of scientific inquiry into intelligence, security, and counterterrorism ent://SD_ILS/0/SD_ILS:482248 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Sari, Arif, 1986- editor.&#160;IGI Global, publisher.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber and electromagnetic threats in modern relay protection ent://SD_ILS/0/SD_ILS:356535 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Gurevich, Vladimir, 1956- author.<br/>Yer Numaras&#305;&#160;ONLINE(356535.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482264326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Conflict and cooperation in cyberspace : the challenge to national security ent://SD_ILS/0/SD_ILS:286332 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Yannakogeorgos, Panayotis A., editor.&#160;Lowther, Adam, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Strategic intelligence management : national security imperatives and information and communications technologies ent://SD_ILS/0/SD_ILS:270363 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Akhgar, Babak.&#160;Yates, Simeon.<br/>Yer Numaras&#305;&#160;TK5102.85 A44 2013<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Cyber challenges and national security threats, opportunities, and power in a virtual world ent://SD_ILS/0/SD_ILS:242513 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Reveron, Derek S.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9781589019195/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Warfare and the Laws of War ent://SD_ILS/0/SD_ILS:237393 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Harrison Dinniss, Heather.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511894527">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:244312 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Demchak, Chris C.&#160;Project Muse.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber attacks protecting national infrastructure ent://SD_ILS/0/SD_ILS:147506 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Amoroso, Edward G.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Science and technology of terrorism and counterterrorism ent://SD_ILS/0/SD_ILS:286279 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Ghosh, Tushar K., Dr.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stealing the network how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:148551 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Long, Johnny.&#160;Russell, Ryan, 1969-&#160;Mullen, Timothy M.&#160;Pinzon, D. Scott.&#160;Black Hat Press (Goodhue, Minn.)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stealing the network how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:112200 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Long, Johnny.&#160;Russell, Ryan, 1969-&#160;Mullen, Timothy M.&#160;Pinzon, D. Scott.&#160;ScienceDirect (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Terror on the Internet : the new arena, the new challenges ent://SD_ILS/0/SD_ILS:105980 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Weimann, Gabriel.<br/>Yer Numaras&#305;&#160;HV 6431 .W435 2006<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> The counterterrorism handbook tactics, procedures, and techniques ent://SD_ILS/0/SD_ILS:286862 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Bolz, Frank, 1930-&#160;Dudonis, Kenneth J.&#160;Schulz, David P.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420057904">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Hacking a terror network the silent threat of covert channels ent://SD_ILS/0/SD_ILS:253987 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Rogers, Russ.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:253990 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;131ah.&#160;Russell, Ryan, 1969-&#160;Moss, Jeff.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2024-12-25T13:31:36Z 2024-12-25T13:31:36Z Yazar&#160;Erbschloe, Michael.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>