Search Results for - Narrowed by: Internet videos. - Messier, Ric, presenter. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Internet$002bvideos.$002509Internet$002bvideos.$0026qf$003dAUTHOR$002509Author$002509Messier$00252C$002bRic$00252C$002bpresenter.$002509Messier$00252C$002bRic$00252C$002bpresenter.$0026ps$003d300? 2024-06-08T23:09:00Z Introduction to web application security testing with Kali Linux. ent://SD_ILS/0/SD_ILS:2334776 2024-06-08T23:09:00Z 2024-06-08T23:09:00Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492030881/?ar">https://go.oreilly.com/library-access/library/view/-/9781492030881/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492030881/?ar">https://learning.oreilly.com/videos/~/9781492030881/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492030881">https://learning.oreilly.com/videos/~/9781492030881</a><br/>Format:&#160;Video recording<br/> Investigation of hidden data in digital files. ent://SD_ILS/0/SD_ILS:2334800 2024-06-08T23:09:00Z 2024-06-08T23:09:00Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029168">https://learning.oreilly.com/videos/~/9781492029168</a> <a href="https://learning.oreilly.com/videos/~/9781492029168/?ar">https://learning.oreilly.com/videos/~/9781492029168/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029168/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029168/?ar</a><br/>Format:&#160;Video recording<br/> Capture and analysis of network-based evidence. ent://SD_ILS/0/SD_ILS:2334767 2024-06-08T23:09:00Z 2024-06-08T23:09:00Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029182/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029182">https://learning.oreilly.com/videos/~/9781492029182</a> <a href="https://learning.oreilly.com/videos/~/9781492029182/?ar">https://learning.oreilly.com/videos/~/9781492029182/?ar</a><br/>Format:&#160;Video recording<br/> Operating system forensic analysis. ent://SD_ILS/0/SD_ILS:2334792 2024-06-08T23:09:00Z 2024-06-08T23:09:00Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029205">https://learning.oreilly.com/videos/~/9781492029205</a> <a href="https://learning.oreilly.com/videos/~/9781492029205/?ar">https://learning.oreilly.com/videos/~/9781492029205/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029205/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029205/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of computer memory. ent://SD_ILS/0/SD_ILS:2334797 2024-06-08T23:09:00Z 2024-06-08T23:09:00Z by&#160;Messier, Ric, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492029144">https://learning.oreilly.com/videos/~/9781492029144</a> <a href="https://learning.oreilly.com/videos/~/9781492029144/?ar">https://learning.oreilly.com/videos/~/9781492029144/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029144/?ar</a><br/>Format:&#160;Video recording<br/> Forensic analysis of disk-based evidence. ent://SD_ILS/0/SD_ILS:2334798 2024-06-08T23:09:00Z 2024-06-08T23:09:00Z by&#160;Messier, Ric, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029120/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029120/?ar">https://learning.oreilly.com/videos/~/9781492029120/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029120">https://learning.oreilly.com/videos/~/9781492029120</a><br/>Format:&#160;Video recording<br/>