Search Results for - Narrowed by: Electronic books. - Réseaux d'ordinateurs -- Sécurité -- Mesures. - Tests d'intrusion.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026qf$003dSUBJECT$002509Subject$002509Tests$002bd$002527intrusion.$002509Tests$002bd$002527intrusion.$0026ps$003d300?2024-06-23T12:15:16ZPenetration Testing Azure for Ethical Hackersent://SD_ILS/0/SD_ILS:23310772024-06-23T12:15:16Z2024-06-23T12:15:16Zby Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>How to hack like a ghostent://SD_ILS/0/SD_ILS:23265072024-06-23T12:15:16Z2024-06-23T12:15:16Zby Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.ent://SD_ILS/0/SD_ILS:23308642024-06-23T12:15:16Z2024-06-23T12:15:16Zby Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Electronic Resources<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:23235892024-06-23T12:15:16Z2024-06-23T12:15:16Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormationent://SD_ILS/0/SD_ILS:23214092024-06-23T12:15:16Z2024-06-23T12:15:16Zby Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Electronic Resources<br/>Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wiresharkent://SD_ILS/0/SD_ILS:23237682024-06-23T12:15:16Z2024-06-23T12:15:16Zby Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkitent://SD_ILS/0/SD_ILS:23191142024-06-23T12:15:16Z2024-06-23T12:15:16Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Electronic Resources<br/>Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applicationsent://SD_ILS/0/SD_ILS:23193602024-06-23T12:15:16Z2024-06-23T12:15:16Zby Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the goent://SD_ILS/0/SD_ILS:23193612024-06-23T12:15:16Z2024-06-23T12:15:16Zby Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-06-23T12:15:16Z2024-06-23T12:15:16Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flawsent://SD_ILS/0/SD_ILS:23178232024-06-23T12:15:16Z2024-06-23T12:15:16Zby Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:23160892024-06-23T12:15:16Z2024-06-23T12:15:16Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linuxent://SD_ILS/0/SD_ILS:23159982024-06-23T12:15:16Z2024-06-23T12:15:16Zby Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format: Electronic Resources<br/>Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suiteent://SD_ILS/0/SD_ILS:23177232024-06-23T12:15:16Z2024-06-23T12:15:16Zby Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a>
<a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format: Electronic Resources<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762024-06-23T12:15:16Z2024-06-23T12:15:16Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-06-23T12:15:16Z2024-06-23T12:15:16Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>Testing practitioner handbook : gain insights into the latest technology and business trends within testing domainsent://SD_ILS/0/SD_ILS:23130292024-06-23T12:15:16Z2024-06-23T12:15:16Zby Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-06-23T12:15:16Z2024-06-23T12:15:16Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>IoT penetration testing cookbook : identify vulnerabilities and secure your smart devicesent://SD_ILS/0/SD_ILS:23150992024-06-23T12:15:16Z2024-06-23T12:15:16Zby Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementationent://SD_ILS/0/SD_ILS:23137412024-06-23T12:15:16Z2024-06-23T12:15:16Zby McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing bootcamp : quickly get up and running with pentesting techniquesent://SD_ILS/0/SD_ILS:23137462024-06-23T12:15:16Z2024-06-23T12:15:16Zby Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenalent://SD_ILS/0/SD_ILS:23138032024-06-23T12:15:16Z2024-06-23T12:15:16Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linuxent://SD_ILS/0/SD_ILS:23100362024-06-23T12:15:16Z2024-06-23T12:15:16Zby Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a>
<a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format: Electronic Resources<br/>Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsent://SD_ILS/0/SD_ILS:23110222024-06-23T12:15:16Z2024-06-23T12:15:16Zby Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format: Electronic Resources<br/>Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modulesent://SD_ILS/0/SD_ILS:23118492024-06-23T12:15:16Z2024-06-23T12:15:16Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a>
<a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format: Electronic Resources<br/>Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!ent://SD_ILS/0/SD_ILS:23118962024-06-23T12:15:16Z2024-06-23T12:15:16Zby Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.ent://SD_ILS/0/SD_ILS:23126192024-06-23T12:15:16Z2024-06-23T12:15:16Zby Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:23146732024-06-23T12:15:16Z2024-06-23T12:15:16Zby Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format: Electronic Resources<br/>Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration testsent://SD_ILS/0/SD_ILS:23086402024-06-23T12:15:16Z2024-06-23T12:15:16Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format: Electronic Resources<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:23030922024-06-23T12:15:16Z2024-06-23T12:15:16Zby Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582024-06-23T12:15:16Z2024-06-23T12:15:16Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>