Arama Sonuçları Information security - Daraltılmış: Computer crimes.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026te$003dILS$0026ps$003d300?dt=list2026-03-21T19:44:34ZCritical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4840612026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adversarial Multimedia Forensicsent://SD_ILS/0/SD_ILS:6027812026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Nowroozi, Ehsan. editor. (orcid)0000-0002-5714-8378 Kallas, Kassem. editor. Jolfaei, Alireza. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-49803-9">https://doi.org/10.1007/978-3-031-49803-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devicesent://SD_ILS/0/SD_ILS:5536012026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Alexandrou, Alex (Professor of information technology security), author.<br/>Yer Numarası HV6773<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedingsent://SD_ILS/0/SD_ILS:6089082026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Praça, Isabel. editor. (orcid)0000-0002-2519-9859 Bernardi, Simona. editor. (orcid)0000-0002-2605-6243 Inácio, Pedro R.M. editor. (orcid)0000-0001-8221-0666 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Resilience: Applied Perspectivesent://SD_ILS/0/SD_ILS:6093532026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Linkov, Igor. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Shakedown The Complete Guide to Understanding and Combating Ransomwareent://SD_ILS/0/SD_ILS:6046732026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Halikias, Harry. author. (orcid)0009-0005-2072-4705 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-65438-1">https://doi.org/10.1007/978-3-031-65438-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Malware Offensive and Defensive Systemsent://SD_ILS/0/SD_ILS:6020262026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Almomani, Iman. editor. Maglaras, Leandros A. editor. Ferrag, Mohamed Amine. editor. Ayres, Nick. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Ageent://SD_ILS/0/SD_ILS:6034562026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Kestner, Peter. author. (orcid)0009-0002-0437-9487 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responsesent://SD_ILS/0/SD_ILS:6023782026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Montasari, Reza. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The cyber risk handbook : creating and measuring effective cybersecurity capabilitiesent://SD_ILS/0/SD_ILS:5936092026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Antonucci, Domenic, author.<br/>Yer Numarası HV6773 .A58 2017<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:6107842026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Thames, Lane. editor. Schaefer, Dirk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-50660-9">https://doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open Source Intelligence Investigation From Strategy to Implementationent://SD_ILS/0/SD_ILS:6115882026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Akhgar, Babak. editor. Bayerl, P. Saskia. editor. Sampson, Fraser. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USAent://SD_ILS/0/SD_ILS:6122862026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Nicholson, Denise. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-03-21T19:44:34Z2026-03-21T19:44:34ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>