Search Results for Computer security. - Narrowed by: Computer crimes.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-09T19:10:31ZComputer securityent://SD_ILS/0/SD_ILS:11759622026-04-09T19:10:31Z2026-04-09T19:10:31Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:9477742026-04-09T19:10:31Z2026-04-09T19:10:31Zby Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing your identity in the information age : protect your family on the internet!ent://SD_ILS/0/SD_ILS:11853182026-04-09T19:10:31Z2026-04-09T19:10:31Zby Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Ulusal bilgi güvenliği : strateji ve kurumsal yapılanmaent://SD_ILS/0/SD_ILS:2864042026-04-09T19:10:31Z2026-04-09T19:10:31Zby Güngör, Murat<br/>Format: Books<br/>Risk factors in computer-crime victimizationent://SD_ILS/0/SD_ILS:10032442026-04-09T19:10:31Z2026-04-09T19:10:31Zby Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format: Electronic Resources<br/>Online safetyent://SD_ILS/0/SD_ILS:10432702026-04-09T19:10:31Z2026-04-09T19:10:31Zby Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:9338642026-04-09T19:10:31Z2026-04-09T19:10:31Zby Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format: Electronic Resources<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:10005672026-04-09T19:10:31Z2026-04-09T19:10:31Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format: Electronic Resources<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:10400102026-04-09T19:10:31Z2026-04-09T19:10:31Zby Shimonski, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1820202">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:11086862026-04-09T19:10:31Z2026-04-09T19:10:31Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:11090622026-04-09T19:10:31Z2026-04-09T19:10:31Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:9365642026-04-09T19:10:31Z2026-04-09T19:10:31Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format: Electronic Resources<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:10630162026-04-09T19:10:31Z2026-04-09T19:10:31Zby Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format: Electronic Resources<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-04-09T19:10:31Z2026-04-09T19:10:31Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172026-04-09T19:10:31Z2026-04-09T19:10:31Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-04-09T19:10:31Z2026-04-09T19:10:31Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-04-09T19:10:31Z2026-04-09T19:10:31Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:11882432026-04-09T19:10:31Z2026-04-09T19:10:31Zby Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>