Search Results for - Narrowed by: Electronic books. - R&eacute;seaux d'ordinateurs -- S&eacute;curit&eacute; -- Mesures. - Tests d'intrusion. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Tests$002bd$002527intrusion.$002509Tests$002bd$002527intrusion.$0026ps$003d300? 2024-06-23T12:15:16Z Penetration Testing Azure for Ethical Hackers ent://SD_ILS/0/SD_ILS:2331077 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a ghost ent://SD_ILS/0/SD_ILS:2326507 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a> <a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes. ent://SD_ILS/0/SD_ILS:2330864 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation ent://SD_ILS/0/SD_ILS:2321409 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a> <a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark ent://SD_ILS/0/SD_ILS:2323768 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit ent://SD_ILS/0/SD_ILS:2319114 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications ent://SD_ILS/0/SD_ILS:2319360 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go ent://SD_ILS/0/SD_ILS:2319361 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws ent://SD_ILS/0/SD_ILS:2317823 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a> <a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:2315998 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite ent://SD_ILS/0/SD_ILS:2317723 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a> <a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> Testing practitioner handbook : gain insights into the latest technology and business trends within testing domains ent://SD_ILS/0/SD_ILS:2313029 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices ent://SD_ILS/0/SD_ILS:2315099 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation ent://SD_ILS/0/SD_ILS:2313741 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a> <a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing bootcamp : quickly get up and running with pentesting techniques ent://SD_ILS/0/SD_ILS:2313746 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal ent://SD_ILS/0/SD_ILS:2313803 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2310036 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a> <a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2311022 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format:&#160;Electronic Resources<br/> Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules ent://SD_ILS/0/SD_ILS:2311849 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a> <a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! ent://SD_ILS/0/SD_ILS:2311896 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules. ent://SD_ILS/0/SD_ILS:2312619 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:2314673 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests ent://SD_ILS/0/SD_ILS:2308640 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2303092 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a> <a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2024-06-23T12:15:16Z 2024-06-23T12:15:16Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/>