Arama Sonuçları Identity theft. - Daraltılmış: Online LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dIdentity$002btheft.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026ic$003dtrue$0026ps$003d300?2026-02-26T08:06:00ZFinancial Identity Theft Context, Challenges and Countermeasuresent://SD_ILS/0/SD_ILS:2056702026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar van der Meulen, Nicole S. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-90-6704-814-9">http://dx.doi.org/10.1007/978-90-6704-814-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Economics of Financial and Medical Identity Theftent://SD_ILS/0/SD_ILS:1740492026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Camp, L. Jean. author. Johnson, M. Eric. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Identity theft and fraud evaluating and managing riskent://SD_ILS/0/SD_ILS:2430162026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Archer, Norman P. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780776619927/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:1666062026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Camp, L. Jean. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Phishing and countermeasures understanding the increasing problem of electronic identity theftent://SD_ILS/0/SD_ILS:2968752026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Jakobsson, Markus. Myers, Steven, 1975-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=18418">http://www.books24x7.com/marc.asp?bookid=18418</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470086106">http://dx.doi.org/10.1002/0470086106</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82196&ref=toc">http://www.myilibrary.com?id=82196&ref=toc</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Artificial intelligence and cybersecurity in healthcareent://SD_ILS/0/SD_ILS:5997412026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Agrawal, Rashmi, editor.<br/>Yer Numarası R859.7 .A78 A78 2025 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Online social networks in business frameworksent://SD_ILS/0/SD_ILS:5994132026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Rathi, Sudhir Kumar, editor. Keswani, Bright. Saxena, Rakesh Kumar. Kapoor, Sumit Kumar. Gupta, Sangita.<br/>Yer Numarası HF5415.1265 .O55 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394231126">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394231126</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Bayuk, Jennifer L., author.<br/>Yer Numarası QA76.9 .A25 B39 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of ICACTCE'23 - The International Conference on Advances in Communication Technology and Computer Engineering New Artificial Intelligence and the Internet of Things Based Perspective and Solutionsent://SD_ILS/0/SD_ILS:5291262026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Iwendi, Celestine. editor. Boulouard, Zakaria. editor. (orcid)0000-0002-4891-3760 Kryvinska, Natalia. editor. (orcid)0000-0003-3678-9229 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-37164-6">https://doi.org/10.1007/978-3-031-37164-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT)ent://SD_ILS/0/SD_ILS:5202552026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Gupta, Sunil. author. Sharma, Hitesh Kumar. author. Kapoor, Monit. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-18896-1">https://doi.org/10.1007/978-3-031-18896-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime during the SARS-CoV-2 pandemic (2019-2022)ent://SD_ILS/0/SD_ILS:5985172026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Yer Numarası HV6773 .C93 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:5950992026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:5445232026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Moore, Robert, 1976-, author.<br/>Yer Numarası HV8079 .C65 M66 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781315721767">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Protection, security, and safeguards : practical approaches and perspectivesent://SD_ILS/0/SD_ILS:5404082026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar June, Dale L.<br/>Yer Numarası HV8290 .P758 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869543">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Identity thieves motives and methodsent://SD_ILS/0/SD_ILS:2427752026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Copes, Heith. Vieraitis, Lynne M. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9781555537685/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Forensic human identificationent://SD_ILS/0/SD_ILS:5393742026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Thompson, Timothy (Timothy J. U.) Black, Sue M.<br/>Yer Numarası RA1055 .F67 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420005714">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Volume 2ent://SD_ILS/0/SD_ILS:5462902026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası QA76.9 .A25 I54 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781135484002">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The privacy papers : managing technology, consumer, employee, and legislative actionent://SD_ILS/0/SD_ILS:5399542026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar Herold, Rebecca.<br/>Yer Numarası KF1262 .P754 2002<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420000177">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Protection, security, and safeguards : practical approaches and perspectivesent://SD_ILS/0/SD_ILS:5423792026-02-26T08:06:00Z2026-02-26T08:06:00ZYazar June, Dale L.<br/>Yer Numarası HV8290 .P758 2000<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420041897">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>