Search Results for - Narrowed by: 2022 - Penetration testing (Computer security)
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092022$0025092022$0026qf$003dSUBJECT$002509Subject$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$0026ps$003d300$0026isd$003dtrue?
2024-06-22T22:48:15Z
Practical social engineering : a primer for the ethical hacker
ent://SD_ILS/0/SD_ILS:2328234
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Gray, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130213/?ar">https://learning.oreilly.com/library/view/~/9781098130213/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098130213">https://learning.oreilly.com/library/view/~/9781098130213</a><br/>Format: Electronic Resources<br/>
Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills
ent://SD_ILS/0/SD_ILS:2332062
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format: Electronic Resources<br/>
Learn hacking Windows 10 using Metasploit from scratch.
ent://SD_ILS/0/SD_ILS:2333043
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Sarraj, Saad, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803241920/?ar">https://learning.oreilly.com/videos/~/9781803241920/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803241920">https://learning.oreilly.com/videos/~/9781803241920</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803241920/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241920/?ar</a><br/>Format: Video recording<br/>
CEH : Certified Ethical Hacker Practice Exams
ent://SD_ILS/0/SD_ILS:2333635
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a>
<a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format: Electronic Resources<br/>
Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheit
ent://SD_ILS/0/SD_ILS:2333963
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a>
<a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format: Electronic Resources<br/>
IoT system testing : an IoT journey from devices to analytics and the edge
ent://SD_ILS/0/SD_ILS:2334592
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format: Electronic Resources<br/>
Offensive hacking unfolded. Become a pro Pentester.
ent://SD_ILS/0/SD_ILS:2334688
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format: Video recording<br/>
Go h*ck yourself : a simple introduction to cyber attacks and defense
ent://SD_ILS/0/SD_ILS:2329952
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Payne, Bryson, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129873/?ar">https://learning.oreilly.com/library/view/~/9781098129873/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129873">https://learning.oreilly.com/library/view/~/9781098129873</a><br/>Format: Electronic Resources<br/>
Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux
ent://SD_ILS/0/SD_ILS:2332265
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>
Learn man in the middle attacks from scratch.
ent://SD_ILS/0/SD_ILS:2332269
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>
The hardware hacking handbook : breaking embedded security with hardware attacks
ent://SD_ILS/0/SD_ILS:2329444
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Woudenberg, Jasper van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129835/?ar">https://learning.oreilly.com/library/view/~/9781098129835/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129835">https://learning.oreilly.com/library/view/~/9781098129835</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar</a><br/>Format: Electronic Resources<br/>
Windows and Linux penetration testing from scratch
ent://SD_ILS/0/SD_ILS:2334282
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Bramwell, Phil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801815123/?ar">https://learning.oreilly.com/library/view/~/9781801815123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815123">https://learning.oreilly.com/library/view/~/9781801815123</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801815123/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815123/?ar</a><br/>Format: Electronic Resources<br/>
Web hacking expert : full-stack exploitation mastery.
ent://SD_ILS/0/SD_ILS:2335278
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>
CEH Certified Ethical Hacker Cert guide
ent://SD_ILS/0/SD_ILS:2331621
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>
The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
ent://SD_ILS/0/SD_ILS:2331878
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a>
<a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format: Electronic Resources<br/>
CEH v11 : certified ethical hacker version 11 practice tests
ent://SD_ILS/0/SD_ILS:2330385
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format: Electronic Resources<br/>
How to hack like a legend : breaking windows
ent://SD_ILS/0/SD_ILS:2334190
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format: Electronic Resources<br/>
The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
ent://SD_ILS/0/SD_ILS:2335335
2024-06-22T22:48:15Z
2024-06-22T22:48:15Z
by Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837632473/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781837632473/?ar">https://learning.oreilly.com/library/view/~/9781837632473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781837632473">https://learning.oreilly.com/library/view/~/9781837632473</a><br/>Format: Sound recording<br/>