Search Results for - Narrowed by: Springer E-Book Collection - Computer security. - Forensic science.
SirsiDynix Enterprise
https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Forensic$002bscience.$002509Forensic$002bscience.$0026ps$003d300?
2024-05-14T20:56:42Z
VoIP and PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:17399
2024-05-14T20:56:42Z
2024-05-14T20:56:42Z
Yazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>
Mobile Phone Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:17402
2024-05-14T20:56:42Z
2024-05-14T20:56:42Z
Yazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>
Industrial Espionage and Technical Surveillance Counter Measurers
ent://SD_ILS/0/SD_ILS:17270
2024-05-14T20:56:42Z
2024-05-14T20:56:42Z
Yazar Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>