Search Results for Computer security. - Narrowed by: Computer crimes. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-09T19:10:31Z Computer security ent://SD_ILS/0/SD_ILS:1175962 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:947774 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your identity in the information age : protect your family on the internet! ent://SD_ILS/0/SD_ILS:1185318 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Electronic Resources<br/> Ulusal bilgi g&uuml;venli&#287;i : strateji ve kurumsal yap&#305;lanma ent://SD_ILS/0/SD_ILS:286404 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;G&uuml;ng&ouml;r, Murat<br/>Format:&#160;Books<br/> Risk factors in computer-crime victimization ent://SD_ILS/0/SD_ILS:1003244 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online safety ent://SD_ILS/0/SD_ILS:1043270 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:933864 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:1000567 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:1040010 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Shimonski, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1820202">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:936564 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;C&#774;erv&#277;n, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:1063016 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:1188417 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:1188243 2026-04-09T19:10:31Z 2026-04-09T19:10:31Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>