Search Results for Computer crimes -- Prevention.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$002b--$002bPrevention.$0026ic$003dtrue$0026ps$003d300?dt=list2026-05-08T16:48:47ZSailing safe in cyberspace : protect your identity and dataent://SD_ILS/0/SD_ILS:10196432026-05-08T16:48:47Z2026-05-08T16:48:47Zby Kaushik, Anjali, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1400595">Click to View</a><br/>Format: Electronic Resources<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202026-05-08T16:48:47Z2026-05-08T16:48:47Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat : a guide to understanding, detecting, and defending against the enemy from withinent://SD_ILS/0/SD_ILS:11228292026-05-08T16:48:47Z2026-05-08T16:48:47Zby Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4794154">Click to View</a><br/>Format: Electronic Resources<br/>The smart girl's guide to privacy : practical tips for staying safe onlineent://SD_ILS/0/SD_ILS:11104282026-05-08T16:48:47Z2026-05-08T16:48:47Zby Blue, Violet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503160">Click to View</a><br/>Format: Electronic Resources<br/>CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviromentent://SD_ILS/0/SD_ILS:10370812026-05-08T16:48:47Z2026-05-08T16:48:47Zby Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format: Electronic Resources<br/>Suçta araç olarak internetin teknik ve hukuki Yönden incelenmesient://SD_ILS/0/SD_ILS:4686492026-05-08T16:48:47Z2026-05-08T16:48:47Zby Yıldız, Sevil<br/>Format: Books<br/>H4ckers5 wanted : an examination of the cybersecurity labor marketent://SD_ILS/0/SD_ILS:10346742026-05-08T16:48:47Z2026-05-08T16:48:47Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1746758">Click to View</a><br/>Format: Electronic Resources<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:10276772026-05-08T16:48:47Z2026-05-08T16:48:47Zby Bernik, Igor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1638160">Click to View</a><br/>Format: Electronic Resources<br/>Cyber risks for business professionals a management guideent://SD_ILS/0/SD_ILS:9730582026-05-08T16:48:47Z2026-05-08T16:48:47Zby Kendrick, Rupert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647937">Click to View</a><br/>Format: Electronic Resources<br/>Managing the human factor in information security how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:9542082026-05-08T16:48:47Z2026-05-08T16:48:47Zby Lacey, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437522">Click to View</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and dangerent://SD_ILS/0/SD_ILS:9607672026-05-08T16:48:47Z2026-05-08T16:48:47Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480406">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing essentialsent://SD_ILS/0/SD_ILS:11301112026-05-08T16:48:47Z2026-05-08T16:48:47Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5086913">Click to View</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:9442822026-05-08T16:48:47Z2026-05-08T16:48:47Zby Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format: Electronic Resources<br/>The science of cybersecurity and a roadmap to researchent://SD_ILS/0/SD_ILS:10591252026-05-08T16:48:47Z2026-05-08T16:48:47Zby Colfer, Benjamin J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3018666">Click to View</a><br/>Format: Electronic Resources<br/>Superhighway robbery preventing e-commerce crimeent://SD_ILS/0/SD_ILS:9610062026-05-08T16:48:47Z2026-05-08T16:48:47Zby Newman, Graeme R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=483190">Click to View</a><br/>Format: Electronic Resources<br/>Cyber mobs : destructive online communitiesent://SD_ILS/0/SD_ILS:11388012026-05-08T16:48:47Z2026-05-08T16:48:47Zby Krumsiek, Allison, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5413245">Click to View</a><br/>Format: Electronic Resources<br/>Deception in the Digital Age : Exploiting and Defending Human Targets Through Computer-Mediated Communications.ent://SD_ILS/0/SD_ILS:11523072026-05-08T16:48:47Z2026-05-08T16:48:47Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5506533">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurityent://SD_ILS/0/SD_ILS:11349442026-05-08T16:48:47Z2026-05-08T16:48:47Zby Higgins, Melissa, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5262186">Click to View</a><br/>Format: Electronic Resources<br/>Security metrics : a beginner's guideent://SD_ILS/0/SD_ILS:2798682026-05-08T16:48:47Z2026-05-08T16:48:47Zby Wong, Caroline<br/>Format: Books<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442026-05-08T16:48:47Z2026-05-08T16:48:47Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:10229382026-05-08T16:48:47Z2026-05-08T16:48:47Zby Akhgar, Babak.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1562332">Click to View</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842026-05-08T16:48:47Z2026-05-08T16:48:47Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:10299612026-05-08T16:48:47Z2026-05-08T16:48:47Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format: Electronic Resources<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272026-05-08T16:48:47Z2026-05-08T16:48:47Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Ethical hackerent://SD_ILS/0/SD_ILS:11322362026-05-08T16:48:47Z2026-05-08T16:48:47Zby Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format: Electronic Resources<br/>Internet freedom software and illicit activity : supporting human rights without enabling criminalsent://SD_ILS/0/SD_ILS:11022622026-05-08T16:48:47Z2026-05-08T16:48:47Zby National Defense Research Institute (U.S.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4001377">Click to View</a><br/>Format: Electronic Resources<br/>At the nexus of cybersecurity and public policy : some basic concepts and issuesent://SD_ILS/0/SD_ILS:10864542026-05-08T16:48:47Z2026-05-08T16:48:47Zby Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962026-05-08T16:48:47Z2026-05-08T16:48:47Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452026-05-08T16:48:47Z2026-05-08T16:48:47Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>Investigating cybercrimeent://SD_ILS/0/SD_ILS:11423932026-05-08T16:48:47Z2026-05-08T16:48:47Zby Timmons, Angie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5533212">Click to View</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:10158672026-05-08T16:48:47Z2026-05-08T16:48:47Zby Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format: Electronic Resources<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712026-05-08T16:48:47Z2026-05-08T16:48:47Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Internet governance in an age of cyber insecurityent://SD_ILS/0/SD_ILS:10708132026-05-08T16:48:47Z2026-05-08T16:48:47Zby Knake, Robert K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3137470">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:9874582026-05-08T16:48:47Z2026-05-08T16:48:47Zby Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format: Electronic Resources<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:11918122026-05-08T16:48:47Z2026-05-08T16:48:47Zby Dunham, Ken.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492980">https://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1335942026-05-08T16:48:47Z2026-05-08T16:48:47Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502026-05-08T16:48:47Z2026-05-08T16:48:47Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-05-08T16:48:47Z2026-05-08T16:48:47Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-05-08T16:48:47Z2026-05-08T16:48:47Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-05-08T16:48:47Z2026-05-08T16:48:47Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention programent://SD_ILS/0/SD_ILS:11880032026-05-08T16:48:47Z2026-05-08T16:48:47Zby Kovacich, Gerald L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679299">http://www.sciencedirect.com/science/book/9780750679299</a><br/>Format: Electronic Resources<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-05-08T16:48:47Z2026-05-08T16:48:47Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>