Search Results for - Narrowed by: Computer hackers. - Computer security. - Electronic books.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bhackers.$002509Computer$002bhackers.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?2024-06-20T13:09:35ZHacking Point of Sale : Payment Application Secrets, Threats, and Solutions.ent://SD_ILS/0/SD_ILS:12679142024-06-20T13:09:35Z2024-06-20T13:09:35Zby Gomzin, Slava.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Android Hacker's Handbook.ent://SD_ILS/0/SD_ILS:12698772024-06-20T13:09:35Z2024-06-20T13:09:35Zby Drake, Joshua J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1662701">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers : The Politics of Open Science.ent://SD_ILS/0/SD_ILS:13229962024-06-20T13:09:35Z2024-06-20T13:09:35Zby Delfanti, Alessandro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Hacking For Dummies.ent://SD_ILS/0/SD_ILS:12526562024-06-20T13:09:35Z2024-06-20T13:09:35Zby Beaver, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:22055522024-06-20T13:09:35Z2024-06-20T13:09:35Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=829964">Click to View</a><br/>Format: Electronic Resources<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332024-06-20T13:09:35Z2024-06-20T13:09:35Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>Dear Hacker : Letters to the Editor Of 2600.ent://SD_ILS/0/SD_ILS:12156712024-06-20T13:09:35Z2024-06-20T13:09:35Zby Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format: Electronic Resources<br/>Social Engineering : The Art of Human Hacking.ent://SD_ILS/0/SD_ILS:12288892024-06-20T13:09:35Z2024-06-20T13:09:35Zby Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the f0rb1dd3n networkent://SD_ILS/0/SD_ILS:22907002024-06-20T13:09:35Z2024-06-20T13:09:35Zby Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>Chained exploits : advanced hacking attacks from start to finishent://SD_ILS/0/SD_ILS:22861032024-06-20T13:09:35Z2024-06-20T13:09:35Zby Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822024-06-20T13:09:35Z2024-06-20T13:09:35Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22824902024-06-20T13:09:35Z2024-06-20T13:09:35Zby Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>Penetration Tester's Open Source Toolkit.ent://SD_ILS/0/SD_ILS:11860462024-06-20T13:09:35Z2024-06-20T13:09:35Zby Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures.ent://SD_ILS/0/SD_ILS:11920262024-06-20T13:09:35Z2024-06-20T13:09:35Zby Contos, Brian T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:642702024-06-20T13:09:35Z2024-06-20T13:09:35Zby Contos, Brian T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:656912024-06-20T13:09:35Z2024-06-20T13:09:35Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>InfoSec Career Hacking : Sell Your Skillz, Not Your Soul.ent://SD_ILS/0/SD_ILS:11831982024-06-20T13:09:35Z2024-06-20T13:09:35Zby Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227231">Click to View</a><br/>Format: Electronic Resources<br/>Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft.ent://SD_ILS/0/SD_ILS:11860612024-06-20T13:09:35Z2024-06-20T13:09:35Zby Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>The art of intrusion the real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:3347082024-06-20T13:09:35Z2024-06-20T13:09:35Zby Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>Stealing the Network : How to Own a Continent.ent://SD_ILS/0/SD_ILS:11921162024-06-20T13:09:35Z2024-06-20T13:09:35Zby Russell, Ryan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294377">Click to View</a><br/>Format: Electronic Resources<br/>Code Hacking : A Developer's Guide to Network Security.ent://SD_ILS/0/SD_ILS:13044362024-06-20T13:09:35Z2024-06-20T13:09:35Zby Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20476392024-06-20T13:09:35Z2024-06-20T13:09:35Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>