Search Results for - Narrowed by: COMPUTERS -- Internet -- Security. - Logiciels libres. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Logiciels$002blibres.$002509Logiciels$002blibres.$0026ps$003d300$0026isd$003dtrue? 2024-09-27T09:57:02Z Metasploit : the penetration tester's guide ent://SD_ILS/0/SD_ILS:2292581 2024-09-27T09:57:02Z 2024-09-27T09:57:02Z by&#160;Kennedy, David, 1982-<br/><a href="https://learning.oreilly.com/library/view/~/9781593272883">https://learning.oreilly.com/library/view/~/9781593272883</a> <a href="https://learning.oreilly.com/library/view/~/9781593272883/?ar">https://learning.oreilly.com/library/view/~/9781593272883/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:2291661 2024-09-27T09:57:02Z 2024-09-27T09:57:02Z by&#160;Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:2284167 2024-09-27T09:57:02Z 2024-09-27T09:57:02Z by&#160;Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools : customizing open source security applications ent://SD_ILS/0/SD_ILS:2281994 2024-09-27T09:57:02Z 2024-09-27T09:57:02Z by&#160;Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format:&#160;Electronic Resources<br/>