Search Results for - Narrowed by: Computer networks -- Security measures. - Hacking.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Hacking.$002509Hacking.$0026ps$003d300?
2024-05-31T20:58:09Z
Offensive hacking unfolded. Become a pro Pentester.
ent://SD_ILS/0/SD_ILS:2334688
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Yadav, Avinash, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar">https://go.oreilly.com/library-access/library/view/-/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294/?ar">https://learning.oreilly.com/videos/~/9781804615294/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781804615294">https://learning.oreilly.com/videos/~/9781804615294</a><br/>Format: Video recording<br/>
Web hacking expert : full-stack exploitation mastery.
ent://SD_ILS/0/SD_ILS:2335278
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>
How to hack like a legend : breaking windows
ent://SD_ILS/0/SD_ILS:2334190
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141431/?ar">https://learning.oreilly.com/library/view/~/9781098141431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141431/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141431">https://learning.oreilly.com/library/view/~/9781098141431</a><br/>Format: Electronic Resources<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>
Web security for developers
ent://SD_ILS/0/SD_ILS:2324422
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Electronic Resources<br/>
The Complete Ethical Hacking Course
ent://SD_ILS/0/SD_ILS:2323185
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
ent://SD_ILS/0/SD_ILS:2321550
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>
Becoming the hacker : the playbook for getting inside the mind of an attacker
ent://SD_ILS/0/SD_ILS:2319129
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>
Web hacking : become a professional web pentester
ent://SD_ILS/0/SD_ILS:2319831
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>
Qi ye shen tou ce shi he chi xu jian kong.
ent://SD_ILS/0/SD_ILS:2332289
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>
Cyber security : endpoint defense
ent://SD_ILS/0/SD_ILS:2316613
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format: Electronic Resources<br/>
Learn ethical hacking from scratch : your stepping stone to penetration testing
ent://SD_ILS/0/SD_ILS:2317259
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : orchestrating attacks
ent://SD_ILS/0/SD_ILS:2318510
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>
Hacking web performance : moving beyond the basics of web performance optimization
ent://SD_ILS/0/SD_ILS:2316902
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format: Electronic Resources<br/>
Ethical hacking masterclass
ent://SD_ILS/0/SD_ILS:2317748
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>
Learn ethical hacking from scratch
ent://SD_ILS/0/SD_ILS:2316923
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>
WiFi hacking : wireless penetration testing for beginners
ent://SD_ILS/0/SD_ILS:2316772
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>
Mastering reverse engineering : re-engineer your ethical hacking skills
ent://SD_ILS/0/SD_ILS:2319089
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format: Electronic Resources<br/>
Learning Kali Linux : security testing, penetration testing, and ethical hacking
ent://SD_ILS/0/SD_ILS:2316978
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format: Electronic Resources<br/>
Ethical hacking : networks and websites
ent://SD_ILS/0/SD_ILS:2318511
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>
Ethical hacking : learning the basics
ent://SD_ILS/0/SD_ILS:2318527
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format: Electronic Resources<br/>
Hei ke wang luo ying yong : wang luo qin ru ying yong.
ent://SD_ILS/0/SD_ILS:2332288
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>
Learn website hacking : penetration testing from scratch
ent://SD_ILS/0/SD_ILS:2316434
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format: Electronic Resources<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:2311833
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format: Electronic Resources<br/>
Forensic analysis of computer memory.
ent://SD_ILS/0/SD_ILS:2334797
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>
Dissecting the hack : the V3rb0ten network
ent://SD_ILS/0/SD_ILS:2309296
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>
Cracking security misconceptions : untangling common myths about modern information security
ent://SD_ILS/0/SD_ILS:2316704
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>
Essential skills for hackers
ent://SD_ILS/0/SD_ILS:2098424
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>
Information security breaches : avoidance treatment based on ISO27001
ent://SD_ILS/0/SD_ILS:2304041
2024-05-31T20:58:09Z
2024-05-31T20:58:09Z
by Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format: Electronic Resources<br/>