Search Results for - Narrowed by: Computer networks -- Security measures. - Broad, James.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Author$002509Broad$00252C$002bJames.$002509Broad$00252C$002bJames.$0026ps$003d300?
2024-05-29T08:59:07Z
Hacking with Kali : practical penetration testing techniques
ent://SD_ILS/0/SD_ILS:2301946
2024-05-29T08:59:07Z
2024-05-29T08:59:07Z
by Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>
Hacking with Kali : Practical Penetration Testing Techniques.
ent://SD_ILS/0/SD_ILS:1253497
2024-05-29T08:59:07Z
2024-05-29T08:59:07Z
by Broad, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115177">Click to View</a><br/>Format: Electronic Resources<br/>