Search Results for - Narrowed by: Penetration testing (Computer security) - Sécurité informatique. - Tests d'intrusion.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Tests$002bd$002527intrusion.$002509Tests$002bd$002527intrusion.$0026ps$003d300?2024-09-25T23:53:39ZCEH Certified Ethical Hacker Cert guideent://SD_ILS/0/SD_ILS:23316212024-09-25T23:53:39Z2024-09-25T23:53:39Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linuxent://SD_ILS/0/SD_ILS:23322652024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>Learn man in the middle attacks from scratch.ent://SD_ILS/0/SD_ILS:23322692024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>Certified ethical hacker (CEH) complete video courseent://SD_ILS/0/SD_ILS:23321462024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format: Video recording<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522024-09-25T23:53:39Z2024-09-25T23:53:39Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:23235892024-09-25T23:53:39Z2024-09-25T23:53:39Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292024-09-25T23:53:39Z2024-09-25T23:53:39Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>The art of hacking (video collection)ent://SD_ILS/0/SD_ILS:23198842024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312024-09-25T23:53:39Z2024-09-25T23:53:39Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:23185542024-09-25T23:53:39Z2024-09-25T23:53:39Zby OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:23270772024-09-25T23:53:39Z2024-09-25T23:53:39Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführenent://SD_ILS/0/SD_ILS:23213482024-09-25T23:53:39Z2024-09-25T23:53:39Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23162552024-09-25T23:53:39Z2024-09-25T23:53:39Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking masterclassent://SD_ILS/0/SD_ILS:23177482024-09-25T23:53:39Z2024-09-25T23:53:39Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>WiFi hacking : wireless penetration testing for beginnersent://SD_ILS/0/SD_ILS:23167722024-09-25T23:53:39Z2024-09-25T23:53:39Zby Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:23172312024-09-25T23:53:39Z2024-09-25T23:53:39Zby Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format: Electronic Resources<br/>Learn website hacking : penetration testing from scratchent://SD_ILS/0/SD_ILS:23164342024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23167902024-09-25T23:53:39Z2024-09-25T23:53:39Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : learning the basicsent://SD_ILS/0/SD_ILS:23185272024-09-25T23:53:39Z2024-09-25T23:53:39Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format: Electronic Resources<br/>Security penetration testing (The art of hacking series)ent://SD_ILS/0/SD_ILS:23141022024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format: Electronic Resources<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratchent://SD_ILS/0/SD_ILS:23169232024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : orchestrating attacksent://SD_ILS/0/SD_ILS:23185102024-09-25T23:53:39Z2024-09-25T23:53:39Zby Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : networks and websitesent://SD_ILS/0/SD_ILS:23185112024-09-25T23:53:39Z2024-09-25T23:53:39Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessusent://SD_ILS/0/SD_ILS:23167002024-09-25T23:53:39Z2024-09-25T23:53:39Zby Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:23172592024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux tutorial for beginnersent://SD_ILS/0/SD_ILS:23175792024-09-25T23:53:39Z2024-09-25T23:53:39Zby Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>Hei ke wang luo ying yong : wang luo qin ru ying yong.ent://SD_ILS/0/SD_ILS:23322882024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>An quan shen tou ce shi.ent://SD_ILS/0/SD_ILS:23324372024-09-25T23:53:39Z2024-09-25T23:53:39Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format: Video recording<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832024-09-25T23:53:39Z2024-09-25T23:53:39Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992024-09-25T23:53:39Z2024-09-25T23:53:39Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.ent://SD_ILS/0/SD_ILS:23153202024-09-25T23:53:39Z2024-09-25T23:53:39Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:23138402024-09-25T23:53:39Z2024-09-25T23:53:39Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23116042024-09-25T23:53:39Z2024-09-25T23:53:39Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar">https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166/?ar">https://learning.oreilly.com/library/view/~/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166">https://learning.oreilly.com/library/view/~/9781786463166</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752024-09-25T23:53:39Z2024-09-25T23:53:39Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:23033122024-09-25T23:53:39Z2024-09-25T23:53:39Zby Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format: Electronic Resources<br/>The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easyent://SD_ILS/0/SD_ILS:22995202024-09-25T23:53:39Z2024-09-25T23:53:39Zby Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing mit Metasploit : Eine praktische Einführungent://SD_ILS/0/SD_ILS:22979132024-09-25T23:53:39Z2024-09-25T23:53:39Zby Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:22930572024-09-25T23:53:39Z2024-09-25T23:53:39Zby Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format: Electronic Resources<br/>BackTrack 4 : assuring security by penetration testingent://SD_ILS/0/SD_ILS:22938712024-09-25T23:53:39Z2024-09-25T23:53:39Zby Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format: Electronic Resources<br/>