Arama Sonuçları Protection. - Daraltılmış: Computer crimes.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dProtection.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue?dt=list2026-03-29T23:43:49ZCybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedingsent://SD_ILS/0/SD_ILS:6089082026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Praça, Isabel. editor. (orcid)0000-0002-2519-9859 Bernardi, Simona. editor. (orcid)0000-0002-2605-6243 Inácio, Pedro R.M. editor. (orcid)0000-0001-8221-0666 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Implication of Cyberattacks on Big Data and How to Mitigate the Riskent://SD_ILS/0/SD_ILS:6081892026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Alaba, Fadele Ayotunde. author. Rocha, Alvaro. author. (orcid)0000-0002-0750-8187 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-88570-9">https://doi.org/10.1007/978-3-031-88570-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Resilience: Applied Perspectivesent://SD_ILS/0/SD_ILS:6093532026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Linkov, Igor. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Malware Offensive and Defensive Systemsent://SD_ILS/0/SD_ILS:6020262026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Almomani, Iman. editor. Maglaras, Leandros A. editor. Ferrag, Mohamed Amine. editor. Ayres, Nick. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adversarial Multimedia Forensicsent://SD_ILS/0/SD_ILS:6027812026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Nowroozi, Ehsan. editor. (orcid)0000-0002-5714-8378 Kallas, Kassem. editor. Jolfaei, Alireza. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-49803-9">https://doi.org/10.1007/978-3-031-49803-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Ageent://SD_ILS/0/SD_ILS:6034562026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Kestner, Peter. author. (orcid)0009-0002-0437-9487 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responsesent://SD_ILS/0/SD_ILS:6023782026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Montasari, Reza. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital Shakedown The Complete Guide to Understanding and Combating Ransomwareent://SD_ILS/0/SD_ILS:6046732026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Halikias, Harry. author. (orcid)0009-0005-2072-4705 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-65438-1">https://doi.org/10.1007/978-3-031-65438-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber law, privacy, and security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4822392026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar IGI Global, publisher. Information Resources Management Association, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4835932026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Flammini, Francesco. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Securityent://SD_ILS/0/SD_ILS:4842012026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4838082026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Madsen, Tom. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4842752026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:3989662026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Lin, Xiaodong. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:6107842026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Thames, Lane. editor. Schaefer, Dirk. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-50660-9">https://doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USAent://SD_ILS/0/SD_ILS:6122862026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Nicholson, Denise. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Open Source Intelligence Investigation From Strategy to Implementationent://SD_ILS/0/SD_ILS:6115882026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Akhgar, Babak. editor. Bayerl, P. Saskia. editor. Sampson, Fraser. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Jakobsson, Markus.<br/>Yer Numarası TK5105.875.I57 D43 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:5443962026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Brancik, Kenneth C., author.<br/>Yer Numarası QA76.9 .A25 B725 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy & human rights : an international survey of privacy laws and developmentsent://SD_ILS/0/SD_ILS:3584512026-03-29T23:43:49Z2026-03-29T23:43:49ZYazar Electronic Privacy Information Center.<br/>Yer Numarası K3264.C65 E54 2004<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>