Arama Sonuçları Information security. - Daraltılmış: Computer crimes.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue?2026-01-30T12:27:26ZCritical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4840612026-01-30T12:27:26Z2026-01-30T12:27:26ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devicesent://SD_ILS/0/SD_ILS:5536012026-01-30T12:27:26Z2026-01-30T12:27:26ZYazar Alexandrou, Alex (Professor of information technology security), author.<br/>Yer Numarası HV6773<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The cyber risk handbook : creating and measuring effective cybersecurity capabilitiesent://SD_ILS/0/SD_ILS:5936092026-01-30T12:27:26Z2026-01-30T12:27:26ZYazar Antonucci, Domenic, author.<br/>Yer Numarası HV6773 .A58 2017<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-01-30T12:27:26Z2026-01-30T12:27:26ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>