Search Results for - Narrowed by: Computer security. - Hacking.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Hacking.$002509Hacking.$0026ps$003d300?2024-06-08T23:31:06ZWeb hacking expert : full-stack exploitation mastery.ent://SD_ILS/0/SD_ILS:23352782024-06-08T23:31:06Z2024-06-08T23:31:06Zby Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a>
<a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format: Video recording<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:23254512024-06-08T23:31:06Z2024-06-08T23:31:06Zby Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522024-06-08T23:31:06Z2024-06-08T23:31:06Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing For Dummiesent://SD_ILS/0/SD_ILS:23272182024-06-08T23:31:06Z2024-06-08T23:31:06Zby Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119577485/?ar">https://learning.oreilly.com/library/view/~/9781119577485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar">https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119577485">https://learning.oreilly.com/library/view/~/9781119577485</a><br/>Format: Electronic Resources<br/>The Complete Ethical Hacking Courseent://SD_ILS/0/SD_ILS:23231852024-06-08T23:31:06Z2024-06-08T23:31:06Zby Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-06-08T23:31:06Z2024-06-08T23:31:06Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>The art of hacking (video collection)ent://SD_ILS/0/SD_ILS:23198842024-06-08T23:31:06Z2024-06-08T23:31:06Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format: Electronic Resources<br/>The Iot hacker's handbook : a practical guide to hacking the internet of thingsent://SD_ILS/0/SD_ILS:23191972024-06-08T23:31:06Z2024-06-08T23:31:06Zby Gupta, Aditya.<br/><a href="https://learning.oreilly.com/library/view/~/9781484243008">https://learning.oreilly.com/library/view/~/9781484243008</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243008/?ar">https://learning.oreilly.com/library/view/~/9781484243008/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-06-08T23:31:06Z2024-06-08T23:31:06Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-06-08T23:31:06Z2024-06-08T23:31:06Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-06-08T23:31:06Z2024-06-08T23:31:06Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking masterclassent://SD_ILS/0/SD_ILS:23177482024-06-08T23:31:06Z2024-06-08T23:31:06Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratchent://SD_ILS/0/SD_ILS:23169232024-06-08T23:31:06Z2024-06-08T23:31:06Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>WiFi hacking : wireless penetration testing for beginnersent://SD_ILS/0/SD_ILS:23167722024-06-08T23:31:06Z2024-06-08T23:31:06Zby Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>Learn website hacking : penetration testing from scratchent://SD_ILS/0/SD_ILS:23164342024-06-08T23:31:06Z2024-06-08T23:31:06Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : orchestrating attacksent://SD_ILS/0/SD_ILS:23185102024-06-08T23:31:06Z2024-06-08T23:31:06Zby Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : networks and websitesent://SD_ILS/0/SD_ILS:23185112024-06-08T23:31:06Z2024-06-08T23:31:06Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : learning the basicsent://SD_ILS/0/SD_ILS:23185272024-06-08T23:31:06Z2024-06-08T23:31:06Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:23172592024-06-08T23:31:06Z2024-06-08T23:31:06Zby Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : endpoint defenseent://SD_ILS/0/SD_ILS:23166132024-06-08T23:31:06Z2024-06-08T23:31:06Zby Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format: Electronic Resources<br/>Cracking codes with Python : an introduction to building and breaking ciphersent://SD_ILS/0/SD_ILS:23143592024-06-08T23:31:06Z2024-06-08T23:31:06Zby Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format: Electronic Resources<br/>Hei ke wang luo ying yong : wang luo qin ru ying yong.ent://SD_ILS/0/SD_ILS:23322882024-06-08T23:31:06Z2024-06-08T23:31:06Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>Mastering reverse engineering : re-engineer your ethical hacking skillsent://SD_ILS/0/SD_ILS:23190892024-06-08T23:31:06Z2024-06-08T23:31:06Zby Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format: Electronic Resources<br/>Hacking the hackerent://SD_ILS/0/SD_ILS:20627952024-06-08T23:31:06Z2024-06-08T23:31:06Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:23131042024-06-08T23:31:06Z2024-06-08T23:31:06Zby Grimes, Roger A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar">https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119396215/?ar">https://learning.oreilly.com/library/view/~/9781119396215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119396215">https://learning.oreilly.com/library/view/~/9781119396215</a><br/>Format: Electronic Resources<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:23118332024-06-08T23:31:06Z2024-06-08T23:31:06Zby Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format: Electronic Resources<br/>Penetration testing essentials.ent://SD_ILS/0/SD_ILS:23119552024-06-08T23:31:06Z2024-06-08T23:31:06Zby Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a>
<a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed industrial control systems : ICS and SCADA security secrets & solutionsent://SD_ILS/0/SD_ILS:23114032024-06-08T23:31:06Z2024-06-08T23:31:06Zby Bodungen, Clint E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar">https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259589720/?ar">https://learning.oreilly.com/library/view/~/9781259589720/?ar</a><br/>Format: Electronic Resources<br/>Beginning ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23122622024-06-08T23:31:06Z2024-06-08T23:31:06Zby Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format: Electronic Resources<br/>Forensic analysis of computer memory.ent://SD_ILS/0/SD_ILS:23347972024-06-08T23:31:06Z2024-06-08T23:31:06Zby Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a>
<a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format: Video recording<br/>Forensic analysis of disk-based evidence.ent://SD_ILS/0/SD_ILS:23347982024-06-08T23:31:06Z2024-06-08T23:31:06Zby Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029120/?ar">https://learning.oreilly.com/videos/~/9781492029120/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029120">https://learning.oreilly.com/videos/~/9781492029120</a><br/>Format: Video recording<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-06-08T23:31:06Z2024-06-08T23:31:06Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-06-08T23:31:06Z2024-06-08T23:31:06Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:20984242024-06-08T23:31:06Z2024-06-08T23:31:06Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat hacking : the art and science of hacking any organizationent://SD_ILS/0/SD_ILS:23065152024-06-08T23:31:06Z2024-06-08T23:31:06Zby Wrightson, Tyler, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071828369">https://learning.oreilly.com/library/view/~/9780071828369</a>
<a href="https://learning.oreilly.com/library/view/~/9780071828369/?ar">https://learning.oreilly.com/library/view/~/9780071828369/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar">https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23065102024-06-08T23:31:06Z2024-06-08T23:31:06Zby Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format: Electronic Resources<br/>Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environmentent://SD_ILS/0/SD_ILS:23040392024-06-08T23:31:06Z2024-06-08T23:31:06Zby Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance treatment based on ISO27001ent://SD_ILS/0/SD_ILS:23040412024-06-08T23:31:06Z2024-06-08T23:31:06Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format: Electronic Resources<br/>The art of intrusion : the real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:22815692024-06-08T23:31:06Z2024-06-08T23:31:06Zby Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format: Electronic Resources<br/>The art of intrusion the real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:3347082024-06-08T23:31:06Z2024-06-08T23:31:06Zby Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>