Search Results for - Narrowed by: Rehim, Rejah, author. - 2016 - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Rehim$00252C$002bRejah$00252C$002bauthor.$002509Rehim$00252C$002bRejah$00252C$002bauthor.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-20T03:06:51Z Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2311022 2024-06-20T03:06:51Z 2024-06-20T03:06:51Z by&#160;Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2276873 2024-06-20T03:06:51Z 2024-06-20T03:06:51Z by&#160;Rehim, Rejah, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594304">Click to View</a><br/>Format:&#160;Electronic Resources<br/>