Search Results for - Narrowed by: Data protection. - Computer crimes. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300? 2024-05-27T04:36:00Z Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2334696 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format:&#160;Sound recording<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:2084051 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cyber-Warfare : A Multidisciplinary Approach. ent://SD_ILS/0/SD_ILS:1253491 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Shakarian, Paulo.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cyber-warfare : a multidisciplinary approach ent://SD_ILS/0/SD_ILS:2300196 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a> <a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Death of the Internet. ent://SD_ILS/0/SD_ILS:1239227 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:2047636 2024-05-27T04:36:00Z 2024-05-27T04:36:00Z by&#160;C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Electronic Resources<br/>