Search Results for - Narrowed by: Computer security. - Hacking. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Hacking.$002509Hacking.$0026ps$003d300? 2024-06-08T23:31:06Z Web hacking expert : full-stack exploitation mastery. ent://SD_ILS/0/SD_ILS:2335278 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Czagan, Dawid, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar">https://go.oreilly.com/library-access/library/view/-/9781837639717/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781837639717">https://learning.oreilly.com/videos/~/9781837639717</a> <a href="https://learning.oreilly.com/videos/~/9781837639717/?ar">https://learning.oreilly.com/videos/~/9781837639717/?ar</a><br/>Format:&#160;Video recording<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:2325451 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a> <a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing For Dummies ent://SD_ILS/0/SD_ILS:2327218 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119577485/?ar">https://learning.oreilly.com/library/view/~/9781119577485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar">https://go.oreilly.com/library-access/library/view/-/9781119577485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119577485">https://learning.oreilly.com/library/view/~/9781119577485</a><br/>Format:&#160;Electronic Resources<br/> The Complete Ethical Hacking Course ent://SD_ILS/0/SD_ILS:2323185 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Percival, Rob, author.<br/><a href="https://learning.oreilly.com/videos/~/9781839210495">https://learning.oreilly.com/videos/~/9781839210495</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar">https://go.oreilly.com/library-access/library/view/-/9781839210495/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781839210495/?ar">https://learning.oreilly.com/videos/~/9781839210495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking (video collection) ent://SD_ILS/0/SD_ILS:2319884 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Iot hacker's handbook : a practical guide to hacking the internet of things ent://SD_ILS/0/SD_ILS:2319197 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Gupta, Aditya.<br/><a href="https://learning.oreilly.com/library/view/~/9781484243008">https://learning.oreilly.com/library/view/~/9781484243008</a> <a href="https://learning.oreilly.com/library/view/~/9781484243008/?ar">https://learning.oreilly.com/library/view/~/9781484243008/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243008/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn website hacking : penetration testing from scratch ent://SD_ILS/0/SD_ILS:2316434 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : orchestrating attacks ent://SD_ILS/0/SD_ILS:2318510 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : networks and websites ent://SD_ILS/0/SD_ILS:2318511 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : learning the basics ent://SD_ILS/0/SD_ILS:2318527 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:2317259 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : endpoint defense ent://SD_ILS/0/SD_ILS:2316613 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Dewey, Gary, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788990981/?ar">https://learning.oreilly.com/videos/~/9781788990981/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990981/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cracking codes with Python : an introduction to building and breaking ciphers ent://SD_ILS/0/SD_ILS:2314359 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Mastering reverse engineering : re-engineer your ethical hacking skills ent://SD_ILS/0/SD_ILS:2319089 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Wong, Reginald, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788838849/?ar">https://learning.oreilly.com/library/view/~/9781788838849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:2062795 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:2313104 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Grimes, Roger A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar">https://go.oreilly.com/library-access/library/view/-/9781119396215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119396215/?ar">https://learning.oreilly.com/library/view/~/9781119396215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119396215">https://learning.oreilly.com/library/view/~/9781119396215</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:2311833 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Winkler, Ira, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128093658/?ar">https://learning.oreilly.com/library/view/~/9780128093658/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar">https://go.oreilly.com/library-access/library/view/-/9780128093658/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128093658">https://learning.oreilly.com/library/view/~/9780128093658</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing essentials. ent://SD_ILS/0/SD_ILS:2311955 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a> <a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed industrial control systems : ICS and SCADA security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2311403 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Bodungen, Clint E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar">https://go.oreilly.com/library-access/library/view/-/9781259589720/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781259589720/?ar">https://learning.oreilly.com/library/view/~/9781259589720/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beginning ethical hacking with Python ent://SD_ILS/0/SD_ILS:2312262 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format:&#160;Electronic Resources<br/> Forensic analysis of computer memory. ent://SD_ILS/0/SD_ILS:2334797 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a> <a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of disk-based evidence. ent://SD_ILS/0/SD_ILS:2334798 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029120/?ar">https://learning.oreilly.com/videos/~/9781492029120/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029120">https://learning.oreilly.com/videos/~/9781492029120</a><br/>Format:&#160;Video recording<br/> Cracking security misconceptions : untangling common myths about modern information security ent://SD_ILS/0/SD_ILS:2316704 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a> <a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2309296 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:2098424 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat hacking : the art and science of hacking any organization ent://SD_ILS/0/SD_ILS:2306515 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Wrightson, Tyler, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071828369">https://learning.oreilly.com/library/view/~/9780071828369</a> <a href="https://learning.oreilly.com/library/view/~/9780071828369/?ar">https://learning.oreilly.com/library/view/~/9780071828369/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar">https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2306510 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment ent://SD_ILS/0/SD_ILS:2304039 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Mehan, Julie E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285728/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285728/?ar">https://learning.oreilly.com/library/view/~/9781849285728/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security breaches : avoidance treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:2304041 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285841/?ar">https://learning.oreilly.com/library/view/~/9781849285841/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285841/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion : the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:2281569 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:334708 2024-06-08T23:31:06Z 2024-06-08T23:31:06Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format:&#160;Electronic Resources<br/>