Search Results for - Narrowed by: O'reilly E-Books - Kali Linux. - Sécurité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dSUBJECT$002509Subject$002509Kali$002bLinux.$002509Kali$002bLinux.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?2024-09-26T06:55:10ZLearn man in the middle attacks from scratch.ent://SD_ILS/0/SD_ILS:23322692024-09-26T06:55:10Z2024-09-26T06:55:10Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linuxent://SD_ILS/0/SD_ILS:23322652024-09-26T06:55:10Z2024-09-26T06:55:10Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:23185542024-09-26T06:55:10Z2024-09-26T06:55:10Zby OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-09-26T06:55:10Z2024-09-26T06:55:10Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics and cyber crime with Kali Linux fundamentalsent://SD_ILS/0/SD_ILS:23140432024-09-26T06:55:10Z2024-09-26T06:55:10Zby Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratchent://SD_ILS/0/SD_ILS:23169232024-09-26T06:55:10Z2024-09-26T06:55:10Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:23172312024-09-26T06:55:10Z2024-09-26T06:55:10Zby Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:23172592024-09-26T06:55:10Z2024-09-26T06:55:10Zby Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux tutorial for beginnersent://SD_ILS/0/SD_ILS:23175792024-09-26T06:55:10Z2024-09-26T06:55:10Zby Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsent://SD_ILS/0/SD_ILS:23132872024-09-26T06:55:10Z2024-09-26T06:55:10Zby Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-09-26T06:55:10Z2024-09-26T06:55:10Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702024-09-26T06:55:10Z2024-09-26T06:55:10Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-09-26T06:55:10Z2024-09-26T06:55:10Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062024-09-26T06:55:10Z2024-09-26T06:55:10Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552024-09-26T06:55:10Z2024-09-26T06:55:10Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:23033122024-09-26T06:55:10Z2024-09-26T06:55:10Zby Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format: Electronic Resources<br/>