Search Results for - Narrowed by: Pirates informatiques.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Pirates$002binformatiques.$002509Pirates$002binformatiques.$0026ps$003d300?
2024-09-22T12:01:35Z
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2331694
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Harper, Allen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar">https://go.oreilly.com/library-access/library/view/-/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955/?ar">https://learning.oreilly.com/library/view/~/9781264268955/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264268955">https://learning.oreilly.com/library/view/~/9781264268955</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
ent://SD_ILS/0/SD_ILS:2331683
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>
The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
ent://SD_ILS/0/SD_ILS:2331878
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a>
<a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
ent://SD_ILS/0/SD_ILS:2325946
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>
Linux basics for hackers : getting started with networking, scripting, and security in Kali
ent://SD_ILS/0/SD_ILS:2318554
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>
Social engineering : the science of human hacking
ent://SD_ILS/0/SD_ILS:2316838
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Hadnagy, Christopher, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar">https://go.oreilly.com/library-access/library/view/-/9781119433385/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119433385/?ar">https://learning.oreilly.com/library/view/~/9781119433385/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for Dummies.
ent://SD_ILS/0/SD_ILS:2316883
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar">https://go.oreilly.com/library-access/library/view/-/9781119485476/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119485476/?ar">https://learning.oreilly.com/library/view/~/9781119485476/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2316898
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format: Electronic Resources<br/>
Threat hunting : a guide to proactive network defense
ent://SD_ILS/0/SD_ILS:2318444
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Electronic Resources<br/>
Security penetration testing (The art of hacking series)
ent://SD_ILS/0/SD_ILS:2314102
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format: Electronic Resources<br/>
Penetration testing essentials.
ent://SD_ILS/0/SD_ILS:2311955
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a>
<a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format: Electronic Resources<br/>
An quan shen tou ce shi.
ent://SD_ILS/0/SD_ILS:2332437
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format: Video recording<br/>
Dissecting the hack : the V3rb0ten network
ent://SD_ILS/0/SD_ILS:2309296
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2309318
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar">https://go.oreilly.com/library-access/library/view/-/9781119154686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119154686/?ar">https://learning.oreilly.com/library/view/~/9781119154686/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2306510
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format: Electronic Resources<br/>
Hacking point of sale : payment application secrets, threats, and solutions
ent://SD_ILS/0/SD_ILS:2302623
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Electronic Resources<br/>
Penetration testing : a hands-on introduction to hacking
ent://SD_ILS/0/SD_ILS:2304411
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format: Electronic Resources<br/>
Web Application Defender's Cookbook : Battling Hackers and Protecting Users.
ent://SD_ILS/0/SD_ILS:2298453
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Barnett, Ryan C.<br/><a href="https://learning.oreilly.com/library/view/~/9781118417058/?ar">https://learning.oreilly.com/library/view/~/9781118417058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar">https://go.oreilly.com/library-access/library/view/-/9781118417058/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118417058">https://learning.oreilly.com/library/view/~/9781118417058</a><br/>Format: Electronic Resources<br/>
Hacking exposed : mobile security secrets & solutions
ent://SD_ILS/0/SD_ILS:2301016
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Bergman, Neil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar">https://go.oreilly.com/library-access/library/view/-/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011/?ar">https://learning.oreilly.com/library/view/~/9780071817011/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071817011">https://learning.oreilly.com/library/view/~/9780071817011</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2298336
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Beaver, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar">https://go.oreilly.com/library-access/library/view/-/9781118380956/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118380956/?ar">https://learning.oreilly.com/library/view/~/9781118380956/?ar</a><br/>Format: Electronic Resources<br/>
Professional penetration testing : creating and learning in a hacking lab
ent://SD_ILS/0/SD_ILS:2299483
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format: Electronic Resources<br/>
The basics of web hacking : tools and techniques to attack the web
ent://SD_ILS/0/SD_ILS:2300058
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>
The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy
ent://SD_ILS/0/SD_ILS:2299520
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format: Electronic Resources<br/>
Low tech hacking : street smarts for security professionals
ent://SD_ILS/0/SD_ILS:2293229
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format: Electronic Resources<br/>
Network forensics : tracking hackers through cyberspace
ent://SD_ILS/0/SD_ILS:2295275
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Davidoff, Sherri.<br/><a href="https://learning.oreilly.com/library/view/~/9780132565110/?ar">https://learning.oreilly.com/library/view/~/9780132565110/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132565110/?ar">https://go.oreilly.com/library-access/library/view/-/9780132565110/?ar</a><br/>Format: Electronic Resources<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:2291334
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Hadnagy, Christopher.<br/><a href="https://learning.oreilly.com/library/view/~/9780470639535/?ar">https://learning.oreilly.com/library/view/~/9780470639535/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar">https://go.oreilly.com/library-access/library/view/-/9780470639535/?ar</a><br/>Format: Electronic Resources<br/>
Ninja hacking : unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:2290304
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Electronic Resources<br/>
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:2293057
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2290821
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Harper, Allen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742559/?ar">https://learning.oreilly.com/library/view/~/9780071742559/?ar</a><br/>Format: Electronic Resources<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:2292506
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a>
<a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format: Electronic Resources<br/>
Preventing good people from doing bad things : implementing least privilege
ent://SD_ILS/0/SD_ILS:2293278
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>
Dear Hacker : letters to the editor of 2600
ent://SD_ILS/0/SD_ILS:2289468
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
Hackers
ent://SD_ILS/0/SD_ILS:2290241
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Levy, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781449390259/?ar">https://learning.oreilly.com/library/view/~/9781449390259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449390259/?ar">https://go.oreilly.com/library-access/library/view/-/9781449390259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449390259">https://learning.oreilly.com/library/view/~/9781449390259</a><br/>Format: Electronic Resources<br/>
Dissecting the hack : the f0rb1dd3n network
ent://SD_ILS/0/SD_ILS:2290700
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>
Chained exploits : advanced hacking attacks from start to finish
ent://SD_ILS/0/SD_ILS:2286103
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Electronic Resources<br/>
Mobile malware attacks and defense
ent://SD_ILS/0/SD_ILS:2294476
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the next generation
ent://SD_ILS/0/SD_ILS:2286898
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Dhanjani, Nitesh.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806309">https://learning.oreilly.com/library/view/~/9780596806309</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806309/?ar">https://learning.oreilly.com/library/view/~/9780596806309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar</a><br/>Format: Electronic Resources<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2284222
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Harris, Shon.<br/><a href="https://learning.oreilly.com/library/view/~/9780071495684/?ar">https://learning.oreilly.com/library/view/~/9780071495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar">https://go.oreilly.com/library-access/library/view/-/9780071495684/?ar</a><br/>Format: Electronic Resources<br/>
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
ent://SD_ILS/0/SD_ILS:2285143
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>
Hacking : the art of exploitation
ent://SD_ILS/0/SD_ILS:2287983
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Erickson, Jon, 1977-<br/><a href="https://learning.oreilly.com/library/view/~/9781593271442">https://learning.oreilly.com/library/view/~/9781593271442</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271442/?ar">https://learning.oreilly.com/library/view/~/9781593271442/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271442/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:2284090
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Contos, Brian T.<br/><a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297">https://learning.oreilly.com/library/view/~/9781597491297</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491297/?ar">https://learning.oreilly.com/library/view/~/9781597491297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491297/?ar</a><br/>Format: Electronic Resources<br/>
InfoSec career hacking : sell your skillz, not your soul
ent://SD_ILS/0/SD_ILS:2282691
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Bayles, Aaron W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490115/?ar">https://learning.oreilly.com/library/view/~/9781597490115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490115">https://learning.oreilly.com/library/view/~/9781597490115</a>
<a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>
The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:334708
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>
The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
ent://SD_ILS/0/SD_ILS:2281569
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Mitnick, Kevin D. (Kevin David), 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar">https://go.oreilly.com/library-access/library/view/-/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829/?ar">https://learning.oreilly.com/library/view/~/9780470503829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470503829">https://learning.oreilly.com/library/view/~/9780470503829</a><br/>Format: Electronic Resources<br/>
Ethical Hack
ent://SD_ILS/0/SD_ILS:2326226
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar">https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414/?ar">https://learning.oreilly.com/library/view/~/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414">https://learning.oreilly.com/library/view/~/9780203495414</a><br/>Format: Electronic Resources<br/>
Honeypots : tracking hackers
ent://SD_ILS/0/SD_ILS:2280821
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format: Electronic Resources<br/>
Hacker's Delight
ent://SD_ILS/0/SD_ILS:2319788
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Warren, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/0201914654">https://learning.oreilly.com/library/view/~/0201914654</a>
<a href="https://learning.oreilly.com/library/view/~/0201914654/?ar">https://learning.oreilly.com/library/view/~/0201914654/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201914654/?ar">https://go.oreilly.com/library-access/library/view/-/0201914654/?ar</a><br/>Format: Electronic Resources<br/>
Hackers Beware
ent://SD_ILS/0/SD_ILS:2319757
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/0735710090">https://learning.oreilly.com/library/view/~/0735710090</a>
<a href="https://learning.oreilly.com/library/view/~/0735710090/?ar">https://learning.oreilly.com/library/view/~/0735710090/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735710090/?ar">https://go.oreilly.com/library-access/library/view/-/0735710090/?ar</a><br/>Format: Electronic Resources<br/>
Open sources : voices from the open source revolution
ent://SD_ILS/0/SD_ILS:2280633
2024-09-22T12:01:35Z
2024-09-22T12:01:35Z
by DiBona, Chris, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1565925823/?ar">https://go.oreilly.com/library-access/library/view/-/1565925823/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565925823/?ar">https://learning.oreilly.com/library/view/~/1565925823/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565925823">https://learning.oreilly.com/library/view/~/1565925823</a><br/>Format: Electronic Resources<br/>