Search Results for Computer crimes -- Prevention. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes$002b--$002bPrevention.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-05-08T16:48:47Z Sailing safe in cyberspace : protect your identity and data ent://SD_ILS/0/SD_ILS:1019643 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Kaushik, Anjali, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1400595">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : a guide to understanding, detecting, and defending against the enemy from within ent://SD_ILS/0/SD_ILS:1122829 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4794154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The smart girl's guide to privacy : practical tips for staying safe online ent://SD_ILS/0/SD_ILS:1110428 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Blue, Violet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment ent://SD_ILS/0/SD_ILS:1037081 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Su&ccedil;ta ara&ccedil; olarak internetin teknik ve hukuki Y&ouml;nden incelenmesi ent://SD_ILS/0/SD_ILS:468649 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Y&#305;ld&#305;z, Sevil<br/>Format:&#160;Books<br/> H4ckers5 wanted : an examination of the cybersecurity labor market ent://SD_ILS/0/SD_ILS:1034674 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1746758">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:1027677 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Bernik, Igor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1638160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber risks for business professionals a management guide ent://SD_ILS/0/SD_ILS:973058 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Kendrick, Rupert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647937">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:954208 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Lacey, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437522">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger ent://SD_ILS/0/SD_ILS:960767 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing essentials ent://SD_ILS/0/SD_ILS:1130111 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5086913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:944282 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The science of cybersecurity and a roadmap to research ent://SD_ILS/0/SD_ILS:1059125 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Colfer, Benjamin J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3018666">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Superhighway robbery preventing e-commerce crime ent://SD_ILS/0/SD_ILS:961006 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Newman, Graeme R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=483190">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber mobs : destructive online communities ent://SD_ILS/0/SD_ILS:1138801 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Krumsiek, Allison, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5413245">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Deception in the Digital Age : Exploiting and Defending Human Targets Through Computer-Mediated Communications. ent://SD_ILS/0/SD_ILS:1152307 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5506533">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity ent://SD_ILS/0/SD_ILS:1134944 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Higgins, Melissa, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5262186">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security metrics : a beginner's guide ent://SD_ILS/0/SD_ILS:279868 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Wong, Caroline<br/>Format:&#160;Books<br/> Network attacks &amp; exploitation : a framework ent://SD_ILS/0/SD_ILS:1103144 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:1022938 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Akhgar, Babak.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1562332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:1029784 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:1029961 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacker ent://SD_ILS/0/SD_ILS:1132236 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet freedom software and illicit activity : supporting human rights without enabling criminals ent://SD_ILS/0/SD_ILS:1102262 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;National Defense Research Institute (U.S.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4001377">Click to View</a><br/>Format:&#160;Electronic Resources<br/> At the nexus of cybersecurity and public policy : some basic concepts and issues ent://SD_ILS/0/SD_ILS:1086454 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:1015545 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Investigating cybercrime ent://SD_ILS/0/SD_ILS:1142393 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Timmons, Angie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5533212">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1015867 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet governance in an age of cyber insecurity ent://SD_ILS/0/SD_ILS:1070813 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Knake, Robert K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3137470">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity public sector threats and responses ent://SD_ILS/0/SD_ILS:987458 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:1191812 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Dunham, Ken.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492980">https://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:1186460 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/> High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program ent://SD_ILS/0/SD_ILS:1188003 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Kovacich, Gerald L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679299">http://www.sciencedirect.com/science/book/9780750679299</a><br/>Format:&#160;Electronic Resources<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2026-05-08T16:48:47Z 2026-05-08T16:48:47Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Electronic Resources<br/>