Arama Sonuçları Security systems. - Daraltılmış: Computer crimes.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300?dt=list
2026-03-13T22:15:35Z
Cyber Resilience: Applied Perspectives
ent://SD_ILS/0/SD_ILS:609353
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Linkov, Igor. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings
ent://SD_ILS/0/SD_ILS:608908
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Praça, Isabel. editor. (orcid)0000-0002-2519-9859 Bernardi, Simona. editor. (orcid)0000-0002-2605-6243 Inácio, Pedro R.M. editor. (orcid)0000-0001-8221-0666 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Implication of Cyberattacks on Big Data and How to Mitigate the Risk
ent://SD_ILS/0/SD_ILS:608189
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Alaba, Fadele Ayotunde. author. Rocha, Alvaro. author. (orcid)0000-0002-0750-8187 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-88570-9">https://doi.org/10.1007/978-3-031-88570-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses
ent://SD_ILS/0/SD_ILS:602378
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Montasari, Reza. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age
ent://SD_ILS/0/SD_ILS:603456
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Kestner, Peter. author. (orcid)0009-0002-0437-9487 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Malware Offensive and Defensive Systems
ent://SD_ILS/0/SD_ILS:602026
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Almomani, Iman. editor. Maglaras, Leandros A. editor. Ferrag, Mohamed Amine. editor. Ayres, Nick. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
AI Embedded Assurance for Cyber Systems
ent://SD_ILS/0/SD_ILS:528935
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Wang, Cliff. editor. Iyengar, S.S. editor. Sun, Kun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
ent://SD_ILS/0/SD_ILS:593609
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Antonucci, Domenic, author.<br/>Yer Numarası HV6773 .A58 2017<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Open Source Intelligence Investigation From Strategy to Implementation
ent://SD_ILS/0/SD_ILS:611588
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Akhgar, Babak. editor. Bayerl, P. Saskia. editor. Sampson, Fraser. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA
ent://SD_ILS/0/SD_ILS:612286
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Nicholson, Denise. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybercrime and espionage an analysis of subversive multi-vector threats
ent://SD_ILS/0/SD_ILS:147518
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Gragido, Will. Pirc, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2026-03-13T22:15:35Z
2026-03-13T22:15:35Z
Yazar Carvey, Harlan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>