Search Results for - Narrowed by: 2018 - Computer crimes. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092018$0025092018$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-20T10:10:51Z Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:2084051 2024-06-20T10:10:51Z 2024-06-20T10:10:51Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:2086915 2024-06-20T10:10:51Z 2024-06-20T10:10:51Z by&#160;Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:2084722 2024-06-20T10:10:51Z 2024-06-20T10:10:51Z by&#160;Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:2086285 2024-06-20T10:10:51Z 2024-06-20T10:10:51Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-06-20T10:10:51Z 2024-06-20T10:10:51Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2024-06-20T10:10:51Z 2024-06-20T10:10:51Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/>