Search Results for - Narrowed by: Computer security. - Network security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Network$002bsecurity.$002509Network$002bsecurity.$0026ps$003d300?2024-05-23T09:10:07ZMalware analysis and detection engineering : a comprehensive approach to detect and analyze modern malwareent://SD_ILS/0/SD_ILS:23258472024-05-23T09:10:07Z2024-05-23T09:10:07Zby Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162024-05-23T09:10:07Z2024-05-23T09:10:07Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity - Attack and Defense Strategies - Second Editionent://SD_ILS/0/SD_ILS:23231022024-05-23T09:10:07Z2024-05-23T09:10:07Zby Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format: Electronic Resources<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:23165462024-05-23T09:10:07Z2024-05-23T09:10:07Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062024-05-23T09:10:07Z2024-05-23T09:10:07Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23167902024-05-23T09:10:07Z2024-05-23T09:10:07Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:23160892024-05-23T09:10:07Z2024-05-23T09:10:07Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchainent://SD_ILS/0/SD_ILS:23170922024-05-23T09:10:07Z2024-05-23T09:10:07Zby Gupta, Rajneesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990189">https://learning.oreilly.com/library/view/~/9781788990189</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990189/?ar">https://learning.oreilly.com/library/view/~/9781788990189/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990189/?ar</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : techniques for ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23167342024-05-23T09:10:07Z2024-05-23T09:10:07Zby Mohit, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138962/?ar">https://learning.oreilly.com/library/view/~/9781789138962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar</a><br/>Format: Electronic Resources<br/>Thinking security : stopping next year's hackersent://SD_ILS/0/SD_ILS:23089322024-05-23T09:10:07Z2024-05-23T09:10:07Zby Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23065102024-05-23T09:10:07Z2024-05-23T09:10:07Zby Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:23026262024-05-23T09:10:07Z2024-05-23T09:10:07Zby Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:22871762024-05-23T09:10:07Z2024-05-23T09:10:07Zby Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>Unauthorised access : physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:22884522024-05-23T09:10:07Z2024-05-23T09:10:07Zby Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>