Search Results for - Narrowed by: ScienceDirect (Online service) - Computer networks -- Security measures. - Computercriminaliteit.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509ScienceDirect$002b$002528Online$002bservice$002529$002509ScienceDirect$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computercriminaliteit.$002509Computercriminaliteit.$0026ps$003d300?2024-06-17T07:46:09ZCyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792024-06-17T07:46:09Z2024-06-17T07:46:09Zby Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712024-06-17T07:46:09Z2024-06-17T07:46:09Zby Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>