Search Results for - Narrowed by: 2022 - Penetration testing (Computer security) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092022$0025092022$0026qf$003dSUBJECT$002509Subject$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$0026ps$003d300$0026isd$003dtrue? 2024-06-22T22:48:15Z Practical social engineering : a primer for the ethical hacker ent://SD_ILS/0/SD_ILS:2328234 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Gray, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130213/?ar">https://learning.oreilly.com/library/view/~/9781098130213/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098130213">https://learning.oreilly.com/library/view/~/9781098130213</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills ent://SD_ILS/0/SD_ILS:2332062 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn hacking Windows 10 using Metasploit from scratch. ent://SD_ILS/0/SD_ILS:2333043 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803241920/?ar">https://learning.oreilly.com/videos/~/9781803241920/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803241920">https://learning.oreilly.com/videos/~/9781803241920</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803241920/?ar">https://go.oreilly.com/library-access/library/view/-/9781803241920/?ar</a><br/>Format:&#160;Video recording<br/> CEH : Certified Ethical Hacker Practice Exams ent://SD_ILS/0/SD_ILS:2333635 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Walker, Matthew.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269976">https://learning.oreilly.com/library/view/~/9781264269976</a> <a href="https://learning.oreilly.com/library/view/~/9781264269976/?ar">https://learning.oreilly.com/library/view/~/9781264269976/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2333963 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783747505649">https://learning.oreilly.com/library/view/~/9783747505649</a> <a href="https://learning.oreilly.com/library/view/~/9783747505649/?ar">https://learning.oreilly.com/library/view/~/9783747505649/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar">https://go.oreilly.com/library-access/library/view/-/9783747505649/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT system testing : an IoT journey from devices to analytics and the edge ent://SD_ILS/0/SD_ILS:2334592 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar">https://go.oreilly.com/library-access/library/view/-/9781484282762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484282762/?ar">https://learning.oreilly.com/library/view/~/9781484282762/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484282762">https://learning.oreilly.com/library/view/~/9781484282762</a><br/>Format:&#160;Electronic Resources<br/> Offensive hacking unfolded. Become a pro Pentester. ent://SD_ILS/0/SD_ILS:2334688 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format:&#160;Video recording<br/> Go h*ck yourself : a simple introduction to cyber attacks and defense ent://SD_ILS/0/SD_ILS:2329952 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Payne, Bryson, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129873/?ar">https://learning.oreilly.com/library/view/~/9781098129873/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129873">https://learning.oreilly.com/library/view/~/9781098129873</a><br/>Format:&#160;Electronic Resources<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> The hardware hacking handbook : breaking embedded security with hardware attacks ent://SD_ILS/0/SD_ILS:2329444 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Woudenberg, Jasper van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129835/?ar">https://learning.oreilly.com/library/view/~/9781098129835/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129835">https://learning.oreilly.com/library/view/~/9781098129835</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows and Linux penetration testing from scratch ent://SD_ILS/0/SD_ILS:2334282 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Bramwell, Phil, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801815123/?ar">https://learning.oreilly.com/library/view/~/9781801815123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801815123">https://learning.oreilly.com/library/view/~/9781801815123</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801815123/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacking expert : full-stack exploitation mastery. ent://SD_ILS/0/SD_ILS:2335278 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a> <a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format:&#160;Video recording<br/> CEH Certified Ethical Hacker Cert guide ent://SD_ILS/0/SD_ILS:2331621 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format:&#160;Electronic Resources<br/> The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire ent://SD_ILS/0/SD_ILS:2331878 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a> <a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 : certified ethical hacker version 11 practice tests ent://SD_ILS/0/SD_ILS:2330385 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a legend : breaking windows ent://SD_ILS/0/SD_ILS:2334190 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format:&#160;Electronic Resources<br/> The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire ent://SD_ILS/0/SD_ILS:2335335 2024-06-22T22:48:15Z 2024-06-22T22:48:15Z by&#160;Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837632473/?ar">https://go.oreilly.com/library-access/library/view/-/9781837632473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781837632473/?ar">https://learning.oreilly.com/library/view/~/9781837632473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781837632473">https://learning.oreilly.com/library/view/~/9781837632473</a><br/>Format:&#160;Sound recording<br/>