Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - Penetration testing (Computer security) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$002509Penetration$002btesting$002b$002528Computer$002bsecurity$002529$0026ps$003d300? 2024-05-26T04:26:45Z CEH Certified Ethical Hacker Cert guide ent://SD_ILS/0/SD_ILS:2331621 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format:&#160;Electronic Resources<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> Certified ethical hacker (CEH) complete video course ent://SD_ILS/0/SD_ILS:2332146 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format:&#160;Video recording<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:2318554 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking (video collection) ent://SD_ILS/0/SD_ILS:2319884 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchf&uuml;hren ent://SD_ILS/0/SD_ILS:2321348 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a> <a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2327077 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:2317259 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:2317231 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2316255 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2316790 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn website hacking : penetration testing from scratch ent://SD_ILS/0/SD_ILS:2316434 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security penetration testing (The art of hacking series) ent://SD_ILS/0/SD_ILS:2314102 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : orchestrating attacks ent://SD_ILS/0/SD_ILS:2318510 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : networks and websites ent://SD_ILS/0/SD_ILS:2318511 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : learning the basics ent://SD_ILS/0/SD_ILS:2318527 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules. ent://SD_ILS/0/SD_ILS:2315320 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing essentials. ent://SD_ILS/0/SD_ILS:2311955 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Oriyano, Sean-Philip.<br/><a href="https://learning.oreilly.com/library/view/~/9781119235309">https://learning.oreilly.com/library/view/~/9781119235309</a> <a href="https://learning.oreilly.com/library/view/~/9781119235309/?ar">https://learning.oreilly.com/library/view/~/9781119235309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar">https://go.oreilly.com/library-access/library/view/-/9781119235309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:2313840 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format:&#160;Electronic Resources<br/> An quan shen tou ce shi. ent://SD_ILS/0/SD_ILS:2332437 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format:&#160;Video recording<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2311604 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar">https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786463166/?ar">https://learning.oreilly.com/library/view/~/9781786463166/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786463166">https://learning.oreilly.com/library/view/~/9781786463166</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:2303475 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:2303312 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy ent://SD_ILS/0/SD_ILS:2299520 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing mit Metasploit : Eine praktische Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:2297913 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 : assuring security by penetration testing ent://SD_ILS/0/SD_ILS:2293871 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:2293057 2024-05-26T04:26:45Z 2024-05-26T04:26:45Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a> <a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format:&#160;Electronic Resources<br/>