Arama Sonuçları Security Measures. - Daraltılmış: Computer crimes.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue?dt=list2026-01-11T08:33:51ZAI Embedded Assurance for Cyber Systemsent://SD_ILS/0/SD_ILS:5289352026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Wang, Cliff. editor. Iyengar, S.S. editor. Sun, Kun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity ethics : an introductionent://SD_ILS/0/SD_ILS:5539412026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Manjikian, Mary, author.<br/>Yer Numarası TK5105.878 .M36 2023<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003248828">https://www.taylorfrancis.com/books/9781003248828</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyberpredators and their preyent://SD_ILS/0/SD_ILS:5556782026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Shapiro, Lauren R., author.<br/>Yer Numarası HV6773 .S533 2023<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003092292">https://www.taylorfrancis.com/books/9781003092292</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devicesent://SD_ILS/0/SD_ILS:5536012026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Alexandrou, Alex (Professor of information technology security), author.<br/>Yer Numarası HV6773<br/>Elektronik Erişim Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4830132026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Iorliam, Aamo. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyberdanger Understanding and Guarding Against Cybercrimeent://SD_ILS/0/SD_ILS:4859362026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Willems, Eddy. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Bernik, Igor, author.<br/>Yer Numarası ONLINE(341980.1)<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Shimonski, Robert.<br/>Yer Numarası ONLINE(355450.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber power : crime, conflict and security in cyberspaceent://SD_ILS/0/SD_ILS:5387472026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Ghernaouti-Helie, Solange, 1958, author.<br/>Yer Numarası HV6773 .G44 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466573055">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Jakobsson, Markus.<br/>Yer Numarası TK5105.875.I57 D43 2012<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Carafano, James Jay, 1955- Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Carafano, James Jay, 1955- Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Carvey, Harlan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Miller, Drew, 1978-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372026-01-11T08:33:51Z2026-01-11T08:33:51ZYazar Skoudis, Ed. Zeltser, Lenny.<br/>Yer Numarası QA76.9.A25 S58 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>