Search Results for - Narrowed by: Computer hackers. - Computer security. - Electronic books. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bhackers.$002509Computer$002bhackers.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300? 2024-06-20T13:09:35Z Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions. ent://SD_ILS/0/SD_ILS:1267914 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Android Hacker's Handbook. ent://SD_ILS/0/SD_ILS:1269877 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Drake, Joshua J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1662701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biohackers : The Politics of Open Science. ent://SD_ILS/0/SD_ILS:1322996 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking For Dummies. ent://SD_ILS/0/SD_ILS:1252656 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:2205552 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-On Ethical Hacking and Network Defense. ent://SD_ILS/0/SD_ILS:1305233 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dear Hacker : Letters to the Editor Of 2600. ent://SD_ILS/0/SD_ILS:1215671 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social Engineering : The Art of Human Hacking. ent://SD_ILS/0/SD_ILS:1228889 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Chained exploits : advanced hacking attacks from start to finish ent://SD_ILS/0/SD_ILS:2286103 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a> <a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2052282 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2282490 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Tester's Open Source Toolkit. ent://SD_ILS/0/SD_ILS:1186046 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures. ent://SD_ILS/0/SD_ILS:1192026 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Contos, Brian T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:64270 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:65691 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> InfoSec Career Hacking : Sell Your Skillz, Not Your Soul. ent://SD_ILS/0/SD_ILS:1183198 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227231">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft. ent://SD_ILS/0/SD_ILS:1186061 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:334708 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format:&#160;Electronic Resources<br/> Stealing the Network : How to Own a Continent. ent://SD_ILS/0/SD_ILS:1192116 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Russell, Ryan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Code Hacking : A Developer's Guide to Network Security. ent://SD_ILS/0/SD_ILS:1304436 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2047639 2024-06-20T13:09:35Z 2024-06-20T13:09:35Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Electronic Resources<br/>