Arama Sonu&ccedil;ları Tests d'intrusion. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dTests$002bd$002527intrusion.$0026ps$003d300?dt=list 2025-07-17T00:21:50Z Ethical hacking : understanding how the good guys find system and web app vulnerabilities before the bad guys do ent://SD_ILS/0/SD_ILS:2313007 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491978375/?ar">https://go.oreilly.com/library-access/library/view/-/9781491978375/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491978375/?ar">https://learning.oreilly.com/videos/~/9781491978375/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : a hands-on introduction to breaking in ent://SD_ILS/0/SD_ILS:2330106 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Graham, Daniel G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129095/?ar">https://learning.oreilly.com/library/view/~/9781098129095/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098129095/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129095/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129095">https://learning.oreilly.com/library/view/~/9781098129095</a><br/>Format:&#160;Electronic Resources<br/> Go h*ck yourself : a simple introduction to cyber attacks and defense ent://SD_ILS/0/SD_ILS:2329952 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Payne, Bryson, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129873/?ar">https://learning.oreilly.com/library/view/~/9781098129873/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129873">https://learning.oreilly.com/library/view/~/9781098129873</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Metasploit Framework : a quickstart guide to White Hat security discovery and exploitation ent://SD_ILS/0/SD_ILS:2311825 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491972045/?ar">https://learning.oreilly.com/videos/~/9781491972045/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491972045/?ar">https://go.oreilly.com/library-access/library/view/-/9781491972045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:2304040 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Crest.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285766/?ar">https://learning.oreilly.com/library/view/~/9781849285766/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285766">https://learning.oreilly.com/library/view/~/9781849285766</a><br/>Format:&#160;Electronic Resources<br/> Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues ent://SD_ILS/0/SD_ILS:2318211 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238912">https://learning.oreilly.com/library/view/~/9781484238912</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484238912/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238912/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238912/?ar">https://learning.oreilly.com/library/view/~/9781484238912/?ar</a><br/>Format:&#160;Electronic Resources<br/> HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATION ent://SD_ILS/0/SD_ILS:2324449 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;HARPREET SINGH; HIMANSHU SHARMA.<br/><a href="https://learning.oreilly.com/library/view/~/9781789953527/?ar">https://learning.oreilly.com/library/view/~/9781789953527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789953527">https://learning.oreilly.com/library/view/~/9781789953527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789953527/?ar">https://go.oreilly.com/library-access/library/view/-/9781789953527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Reverse engineering and exploit development : application penetration testing for security professionals ent://SD_ILS/0/SD_ILS:2307226 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Polstra, Philip, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781771373654/?ar">https://learning.oreilly.com/videos/~/9781771373654/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771373654/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373654/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux Penetration Testing Bible ent://SD_ILS/0/SD_ILS:2328773 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Khawaja, Gus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119719083">https://learning.oreilly.com/library/view/~/9781119719083</a> <a href="https://learning.oreilly.com/library/view/~/9781119719083/?ar">https://learning.oreilly.com/library/view/~/9781119719083/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119719083/?ar">https://go.oreilly.com/library-access/library/view/-/9781119719083/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking mit Metasploit : Das umfassende Handbuch zu Penetration Testing und Metasploit ent://SD_ILS/0/SD_ILS:2315167 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messner, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492065470/?ar">https://go.oreilly.com/library-access/library/view/-/9781492065470/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492065470/?ar">https://learning.oreilly.com/library/view/~/9781492065470/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing services procurement guide. Version 1. ent://SD_ILS/0/SD_ILS:2304037 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Creasey, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285803/?ar">https://learning.oreilly.com/library/view/~/9781849285803/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849285803">https://learning.oreilly.com/library/view/~/9781849285803</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:2311874 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Andress, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128054734/?ar">https://go.oreilly.com/library-access/library/view/-/9780128054734/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128054734/?ar">https://learning.oreilly.com/library/view/~/9780128054734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchf&uuml;hren ent://SD_ILS/0/SD_ILS:2321348 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a> <a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2018 : assuring security by penetration testing : unleash the full potential of Kali Linux 2018, now with updated tools ent://SD_ILS/0/SD_ILS:2318159 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Parasram, Shiva V. N., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789341768/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789341768/?ar">https://learning.oreilly.com/library/view/~/9781789341768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux 2018 : Windows penetration testing : conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 ent://SD_ILS/0/SD_ILS:2318157 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788997461/?ar">https://learning.oreilly.com/library/view/~/9781788997461/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788997461/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997461/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bug bounty hunting essentials : quick-paced guide to help white-hat hackers get through bug bounty programs ent://SD_ILS/0/SD_ILS:2318643 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626897/?ar">https://learning.oreilly.com/library/view/~/9781788626897/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788626897">https://learning.oreilly.com/library/view/~/9781788626897</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788626897/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626897/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing mit Metasploit : Eine praktische Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:2297913 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux web penetration testing cookbook : identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x ent://SD_ILS/0/SD_ILS:2317506 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;N&aacute;jera-Guti&eacute;rrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788991513/?ar">https://learning.oreilly.com/library/view/~/9781788991513/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788991513/?ar">https://go.oreilly.com/library-access/library/view/-/9781788991513/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux : testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie ent://SD_ILS/0/SD_ILS:2325945 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098124977/?ar">https://go.oreilly.com/library-access/library/view/-/9781098124977/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098124977/?ar">https://learning.oreilly.com/library/view/~/9781098124977/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098124977">https://learning.oreilly.com/library/view/~/9781098124977</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing with Python : enhance your ethical hacking skills to build automated and intelligent systems ent://SD_ILS/0/SD_ILS:2318817 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Khan, Furqan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990820/?ar">https://learning.oreilly.com/library/view/~/9781788990820/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788990820">https://learning.oreilly.com/library/view/~/9781788990820</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788990820/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990820/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with Raspberry Pi : construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi ent://SD_ILS/0/SD_ILS:2306226 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Muniz, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784396435">https://learning.oreilly.com/library/view/~/9781784396435</a> <a href="https://learning.oreilly.com/library/view/~/9781784396435/?ar">https://learning.oreilly.com/library/view/~/9781784396435/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784396435/?ar">https://go.oreilly.com/library-access/library/view/-/9781784396435/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning iOS penetration testing : secure your iOS applications and uncover hidden vunerabilities by conducting penetration tests ent://SD_ILS/0/SD_ILS:2309690 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Yermalkar, Swaroop, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883255/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883255/?ar">https://learning.oreilly.com/library/view/~/9781785883255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883255">https://learning.oreilly.com/library/view/~/9781785883255</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook, second edition ent://SD_ILS/0/SD_ILS:2300197 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of hacking (video collection) ent://SD_ILS/0/SD_ILS:2319884 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security penetration testing (The art of hacking series) ent://SD_ILS/0/SD_ILS:2314102 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with Raspberry Pi : learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 ent://SD_ILS/0/SD_ILS:2312236 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;McPhee, Michael (systems engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787126138/?ar">https://learning.oreilly.com/library/view/~/9781787126138/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787126138/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126138/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical IoT hacking : the definitive guide to attacking the internet of things ent://SD_ILS/0/SD_ILS:2325202 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Chantzis, Fotios, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128876/?ar">https://learning.oreilly.com/library/view/~/9781098128876/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128876/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128876/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098128876">https://learning.oreilly.com/library/view/~/9781098128876</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:2315384 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554089/?ar">https://learning.oreilly.com/library/view/~/9781783554089/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554089">https://learning.oreilly.com/library/view/~/9781783554089</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job ent://SD_ILS/0/SD_ILS:2305738 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Mahajan, Akash, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783550111">https://learning.oreilly.com/library/view/~/9781783550111</a> <a href="https://learning.oreilly.com/library/view/~/9781783550111/?ar">https://learning.oreilly.com/library/view/~/9781783550111/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar">https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking und Bug Hunting ent://SD_ILS/0/SD_ILS:2326289 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Yaworski, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9781098124656">https://learning.oreilly.com/library/view/~/9781098124656</a> <a href="https://learning.oreilly.com/library/view/~/9781098124656/?ar">https://learning.oreilly.com/library/view/~/9781098124656/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098124656/?ar">https://go.oreilly.com/library-access/library/view/-/9781098124656/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing cookbook : practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation ent://SD_ILS/0/SD_ILS:2315078 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rehim, Rejah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784399771">https://learning.oreilly.com/library/view/~/9781784399771</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784399771/?ar">https://go.oreilly.com/library-access/library/view/-/9781784399771/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784399771/?ar">https://learning.oreilly.com/library/view/~/9781784399771/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python ethical hacking from scratch : think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware ent://SD_ILS/0/SD_ILS:2329152 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sarwar, Fahad Ali.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838829506/?ar">https://go.oreilly.com/library-access/library/view/-/9781838829506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838829506/?ar">https://learning.oreilly.com/library/view/~/9781838829506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838829506">https://learning.oreilly.com/library/view/~/9781838829506</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux web penetration testing cookbook : over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 ent://SD_ILS/0/SD_ILS:2310108 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;N&aacute;jera-Guti&eacute;rrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784392918">https://learning.oreilly.com/library/view/~/9781784392918</a> <a href="https://learning.oreilly.com/library/view/~/9781784392918/?ar">https://learning.oreilly.com/library/view/~/9781784392918/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784392918/?ar">https://go.oreilly.com/library-access/library/view/-/9781784392918/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced white hat hacking and penetration testing ent://SD_ILS/0/SD_ILS:2299825 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370998/?ar">https://learning.oreilly.com/videos/~/9781771370998/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771370998/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370998/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to penetration testing : finding and analyzing vulnerabilities in systems and networks with Kali Linux ent://SD_ILS/0/SD_ILS:2309532 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375245/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771375245/?ar">https://learning.oreilly.com/videos/~/9781771375245/?ar</a><br/>Format:&#160;Electronic Resources<br/> Black Hat Go : Go programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:2322469 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Steele, Tom (Security Consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122645">https://learning.oreilly.com/library/view/~/9781098122645</a> <a href="https://learning.oreilly.com/library/view/~/9781098122645/?ar">https://learning.oreilly.com/library/view/~/9781098122645/?ar</a><br/>Format:&#160;Electronic Resources<br/> Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit ent://SD_ILS/0/SD_ILS:2318079 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242704/?ar">https://learning.oreilly.com/library/view/~/9781484242704/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242704/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242704/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242704">https://learning.oreilly.com/library/view/~/9781484242704</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills ent://SD_ILS/0/SD_ILS:2332062 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing mit Metasploit : Praxiswissen f&uuml;r mehr IT-Sicherheit ent://SD_ILS/0/SD_ILS:2316255 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile application penetration testing : explore real-world threat scenarios, attacks on mobile applications, and ways to counter them ent://SD_ILS/0/SD_ILS:2310199 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883378/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883378/?ar">https://learning.oreilly.com/library/view/~/9781785883378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785883378">https://learning.oreilly.com/library/view/~/9781785883378</a><br/>Format:&#160;Electronic Resources<br/> Hacking mit Metasploit : Das umfassende handbuch zu penetration testing und metasploit ent://SD_ILS/0/SD_ILS:2306969 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messner, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457194221/?ar">https://learning.oreilly.com/library/view/~/9781457194221/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457194221/?ar">https://go.oreilly.com/library-access/library/view/-/9781457194221/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit - Fourth Edition ent://SD_ILS/0/SD_ILS:2326152 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838980078/?ar">https://go.oreilly.com/library-access/library/view/-/9781838980078/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838980078">https://learning.oreilly.com/library/view/~/9781838980078</a> <a href="https://learning.oreilly.com/library/view/~/9781838980078/?ar">https://learning.oreilly.com/library/view/~/9781838980078/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional guide to wireless network hacking and penetration testing ent://SD_ILS/0/SD_ILS:2306861 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373555/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373555/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771373555/?ar">https://learning.oreilly.com/videos/~/9781771373555/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux ent://SD_ILS/0/SD_ILS:2303067 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Allen, Lee (Information security specialist)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519489/?ar">https://learning.oreilly.com/library/view/~/9781849519489/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849519489">https://learning.oreilly.com/library/view/~/9781849519489</a><br/>Format:&#160;Electronic Resources<br/> Learning network penetration testing with Kali Linux ent://SD_ILS/0/SD_ILS:2317102 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gradisteanu, Cristian, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787129481/?ar">https://learning.oreilly.com/videos/~/9781787129481/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787129481/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129481/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security testing and ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:2315609 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029328/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029328/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492029328/?ar">https://learning.oreilly.com/videos/~/9781492029328/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python for offensive PenTest : a practical guide to ethical hacking and penetration testing using Python ent://SD_ILS/0/SD_ILS:2316495 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Khrais, Hussam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788838979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838979/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788838979/?ar">https://learning.oreilly.com/library/view/~/9781788838979/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit : Das Handbuch zum Penetration-Testing-Framework. ent://SD_ILS/0/SD_ILS:2295114 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messner, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170850/?ar">https://learning.oreilly.com/library/view/~/9781457170850/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457170850/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170850/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit ent://SD_ILS/0/SD_ILS:2319114 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation ent://SD_ILS/0/SD_ILS:2313741 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a> <a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal ent://SD_ILS/0/SD_ILS:2313803 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules. ent://SD_ILS/0/SD_ILS:2312619 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit Penetration Testing Cookbook. ent://SD_ILS/0/SD_ILS:2295109 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Singh, Abhinav.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849517423/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517423/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849517423/?ar">https://learning.oreilly.com/library/view/~/9781849517423/?ar</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:2295451 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Andress, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497305/?ar">https://learning.oreilly.com/library/view/~/9781597497305/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar</a><br/>Format:&#160;Electronic Resources<br/> Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite ent://SD_ILS/0/SD_ILS:2317723 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a> <a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a hands-on introduction to hacking ent://SD_ILS/0/SD_ILS:2304411 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format:&#160;Electronic Resources<br/> Learn social engineering from scratch ent://SD_ILS/0/SD_ILS:2316600 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789341584/?ar">https://learning.oreilly.com/videos/~/9781789341584/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more ent://SD_ILS/0/SD_ILS:2317003 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Khawaja, Gus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624039/?ar">https://learning.oreilly.com/library/view/~/9781788624039/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:2299483 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy ent://SD_ILS/0/SD_ILS:2299520 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bug bounty bootcamp : the guide to finding and reporting web vulnerabilities ent://SD_ILS/0/SD_ILS:2329340 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Li, Vickie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129088/?ar">https://learning.oreilly.com/library/view/~/9781098129088/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129088">https://learning.oreilly.com/library/view/~/9781098129088</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098129088/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129088/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration Testing Azure for Ethical Hackers ent://SD_ILS/0/SD_ILS:2331077 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bayesian methods for hackers : probabilistic programming and Bayesian inference ent://SD_ILS/0/SD_ILS:2308720 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Davidson-Pilon, Cameron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133902914/?ar">https://learning.oreilly.com/library/view/~/9780133902914/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133902914/?ar">https://go.oreilly.com/library-access/library/view/-/9780133902914/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:2298529 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Neely, Matthew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497312/?ar">https://learning.oreilly.com/library/view/~/9781597497312/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:2293057 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a> <a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework ent://SD_ILS/0/SD_ILS:2316088 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Teixeira, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623179/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623179/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788623179/?ar">https://learning.oreilly.com/library/view/~/9781788623179/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privilege Escalation Techniques ent://SD_ILS/0/SD_ILS:2331120 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Ahmed, Alexis, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801078870/?ar">https://learning.oreilly.com/library/view/~/9781801078870/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801078870/?ar">https://go.oreilly.com/library-access/library/view/-/9781801078870/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801078870">https://learning.oreilly.com/library/view/~/9781801078870</a><br/>Format:&#160;Electronic Resources<br/> The pentester blueprint : starting a career as an ethical hacker ent://SD_ILS/0/SD_ILS:2326022 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Wylie, Phillip L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119684305/?ar">https://learning.oreilly.com/library/view/~/9781119684305/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119684305">https://learning.oreilly.com/library/view/~/9781119684305</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119684305/?ar">https://go.oreilly.com/library-access/library/view/-/9781119684305/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark ent://SD_ILS/0/SD_ILS:2323768 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Python web penetration testing : automate web penetration testing activities using Python ent://SD_ILS/0/SD_ILS:2317026 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Martorella, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789533972/?ar">https://learning.oreilly.com/library/view/~/9781789533972/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar">https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go ent://SD_ILS/0/SD_ILS:2319361 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux ent://SD_ILS/0/SD_ILS:2310036 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a> <a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world bug hunting : a field guide to web hacking ent://SD_ILS/0/SD_ILS:2318428 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Yaworski, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122508">https://learning.oreilly.com/library/view/~/9781098122508</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098122508/?ar">https://learning.oreilly.com/library/view/~/9781098122508/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules. ent://SD_ILS/0/SD_ILS:2315320 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format:&#160;Electronic Resources<br/> The hardware hacking handbook : breaking embedded security with hardware attacks ent://SD_ILS/0/SD_ILS:2329444 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Woudenberg, Jasper van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129835/?ar">https://learning.oreilly.com/library/view/~/9781098129835/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098129835">https://learning.oreilly.com/library/view/~/9781098129835</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar</a><br/>Format:&#160;Electronic Resources<br/> The complete Metasploit guide : explore effective penetration testing techniques with Metasploit ent://SD_ILS/0/SD_ILS:2327077 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a> <a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Kali Linux : security testing, penetration testing, and ethical hacking ent://SD_ILS/0/SD_ILS:2316978 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:2313840 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format:&#160;Electronic Resources<br/> IoT-Hacking : Sicherheitsl&uuml;cken im Internet der Dinge erkennen und schliessen ent://SD_ILS/0/SD_ILS:2310251 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457199752">https://learning.oreilly.com/library/view/~/9781457199752</a> <a href="https://learning.oreilly.com/library/view/~/9781457199752/?ar">https://learning.oreilly.com/library/view/~/9781457199752/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar">https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications ent://SD_ILS/0/SD_ILS:2319360 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format:&#160;Electronic Resources<br/> Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! ent://SD_ILS/0/SD_ILS:2311896 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a> <a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons ent://SD_ILS/0/SD_ILS:2321550 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : learning the basics ent://SD_ILS/0/SD_ILS:2318527 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 : assuring security by penetration testing ent://SD_ILS/0/SD_ILS:2293871 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a guide for business and it managers. ent://SD_ILS/0/SD_ILS:2321708 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z <a href="https://learning.oreilly.com/library/view/~/9781780174082/?ar">https://learning.oreilly.com/library/view/~/9781780174082/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174082">https://learning.oreilly.com/library/view/~/9781780174082</a><br/>Format:&#160;Electronic Resources<br/> Learn website hacking : penetration testing from scratch ent://SD_ILS/0/SD_ILS:2316434 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:2314673 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format:&#160;Electronic Resources<br/> CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:2293366 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar">https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439880289/?ar">https://learning.oreilly.com/library/view/~/9781439880289/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : orchestrating attacks ent://SD_ILS/0/SD_ILS:2318510 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking : networks and websites ent://SD_ILS/0/SD_ILS:2318511 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:2318554 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2311604 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar">https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786463166/?ar">https://learning.oreilly.com/library/view/~/9781786463166/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786463166">https://learning.oreilly.com/library/view/~/9781786463166</a><br/>Format:&#160;Electronic Resources<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:2303092 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a> <a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:2301946 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a> <a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format:&#160;Electronic Resources<br/> WiFi hacking : wireless penetration testing for beginners ent://SD_ILS/0/SD_ILS:2316772 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking masterclass ent://SD_ILS/0/SD_ILS:2317748 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation ent://SD_ILS/0/SD_ILS:2321409 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a> <a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:2315998 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to hack like a ghost ent://SD_ILS/0/SD_ILS:2326507 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a> <a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:2317259 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a> <a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH Certified Ethical Hacker Cert guide ent://SD_ILS/0/SD_ILS:2331621 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch ent://SD_ILS/0/SD_ILS:2316923 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network scanning cookbook : practical network security using Nmap and Nessus 7 ent://SD_ILS/0/SD_ILS:2317776 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux tutorial for beginners ent://SD_ILS/0/SD_ILS:2317579 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format:&#160;Electronic Resources<br/> GPEN GIAC Certified Penetration Tester All-In-One Exam Guide ent://SD_ILS/0/SD_ILS:2326534 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Nutting, Raymond.<br/><a href="https://learning.oreilly.com/library/view/~/9781260456752">https://learning.oreilly.com/library/view/~/9781260456752</a> <a href="https://learning.oreilly.com/library/view/~/9781260456752/?ar">https://learning.oreilly.com/library/view/~/9781260456752/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260456752/?ar">https://go.oreilly.com/library-access/library/view/-/9781260456752/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools ent://SD_ILS/0/SD_ILS:2311022 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format:&#160;Electronic Resources<br/> Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws ent://SD_ILS/0/SD_ILS:2317823 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a> <a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Azure applications : the definitive guide to testing and securing deployments ent://SD_ILS/0/SD_ILS:2317413 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Burrough, Matt, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069416/?ar">https://learning.oreilly.com/library/view/~/9781492069416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492069416">https://learning.oreilly.com/library/view/~/9781492069416</a><br/>Format:&#160;Electronic Resources<br/> Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes. ent://SD_ILS/0/SD_ILS:2330864 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : techniques for ethical hacking with Python ent://SD_ILS/0/SD_ILS:2316734 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Mohit, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138962/?ar">https://learning.oreilly.com/library/view/~/9781789138962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus ent://SD_ILS/0/SD_ILS:2316700 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : protecting networks and systems ent://SD_ILS/0/SD_ILS:2295898 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learn social engineering : learn the art of human hacking with an internationally renowned expert ent://SD_ILS/0/SD_ILS:2316546 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Python ent://SD_ILS/0/SD_ILS:2317035 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788997409/?ar">https://learning.oreilly.com/library/view/~/9781788997409/?ar</a><br/>Format:&#160;Electronic Resources<br/> The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire ent://SD_ILS/0/SD_ILS:2331878 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a> <a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing bootcamp : quickly get up and running with pentesting techniques ent://SD_ILS/0/SD_ILS:2313746 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:2303475 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux ent://SD_ILS/0/SD_ILS:2332265 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format:&#160;Video recording<br/> Learn man in the middle attacks from scratch. ent://SD_ILS/0/SD_ILS:2332269 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format:&#160;Video recording<br/> Web hacking : become a professional web pentester ent://SD_ILS/0/SD_ILS:2319831 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format:&#160;Electronic Resources<br/> Becoming the hacker : the playbook for getting inside the mind of an attacker ent://SD_ILS/0/SD_ILS:2319129 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:2313499 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for pentesters : hands-on learning. ent://SD_ILS/0/SD_ILS:2331969 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a> <a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format:&#160;Video recording<br/> Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Linux and Metasploit ent://SD_ILS/0/SD_ILS:2322241 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781838646073">https://learning.oreilly.com/library/view/~/9781838646073</a> <a href="https://learning.oreilly.com/library/view/~/9781838646073/?ar">https://learning.oreilly.com/library/view/~/9781838646073/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar">https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests ent://SD_ILS/0/SD_ILS:2308640 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format:&#160;Electronic Resources<br/> An quan shen tou ce shi. ent://SD_ILS/0/SD_ILS:2332437 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format:&#160;Video recording<br/> Practical social engineering : a primer for the ethical hacker ent://SD_ILS/0/SD_ILS:2328234 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Gray, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130213/?ar">https://learning.oreilly.com/library/view/~/9781098130213/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098130213">https://learning.oreilly.com/library/view/~/9781098130213</a><br/>Format:&#160;Electronic Resources<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:2325452 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a> <a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:2314683 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a> <a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:2317231 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a> <a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:2300719 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar">https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466575318/?ar">https://learning.oreilly.com/library/view/~/9781466575318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466575318">https://learning.oreilly.com/library/view/~/9781466575318</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:2316089 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Technische IT-Security f&uuml;r IT Security Manager : Von Cloud Computing &uuml;ber WLAN bis zu Penetrationstests ent://SD_ILS/0/SD_ILS:2318537 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958454439/?ar">https://learning.oreilly.com/library/view/~/9783958454439/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar">https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices ent://SD_ILS/0/SD_ILS:2315099 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2313301 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a> <a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit : the penetration tester's guide ent://SD_ILS/0/SD_ILS:2292581 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Kennedy, David, 1982-<br/><a href="https://learning.oreilly.com/library/view/~/9781593272883">https://learning.oreilly.com/library/view/~/9781593272883</a> <a href="https://learning.oreilly.com/library/view/~/9781593272883/?ar">https://learning.oreilly.com/library/view/~/9781593272883/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:2303312 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format:&#160;Electronic Resources<br/> Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:2316790 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:2316898 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:2323589 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules ent://SD_ILS/0/SD_ILS:2311849 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a> <a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution ent://SD_ILS/0/SD_ILS:2308075 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Alamanni, Marco, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280856/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280856/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785280856">https://learning.oreilly.com/library/view/~/9781785280856</a> <a href="https://learning.oreilly.com/library/view/~/9781785280856/?ar">https://learning.oreilly.com/library/view/~/9781785280856/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali LInux CTF blueprints : build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:2303998 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Buchanan, Cameron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar">https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783985982/?ar">https://learning.oreilly.com/library/view/~/9781783985982/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing ent://SD_ILS/0/SD_ILS:2319847 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format:&#160;Electronic Resources<br/> Testing practitioner handbook : gain insights into the latest technology and business trends within testing domains ent://SD_ILS/0/SD_ILS:2313029 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format:&#160;Electronic Resources<br/> Qi ye shen tou ce shi he chi xu jian kong. ent://SD_ILS/0/SD_ILS:2332289 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a> <a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a> <a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format:&#160;Video recording<br/> Hei ke wang luo ying yong : wang luo qin ru ying yong. ent://SD_ILS/0/SD_ILS:2332288 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a> <a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format:&#160;Video recording<br/> Certified ethical hacker (CEH) complete video course ent://SD_ILS/0/SD_ILS:2332146 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format:&#160;Video recording<br/> Managing information security ent://SD_ILS/0/SD_ILS:2300537 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002) ent://SD_ILS/0/SD_ILS:2332285 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Linn, Heather, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781264274901">https://learning.oreilly.com/library/view/~/9781264274901</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781264274901/?ar">https://go.oreilly.com/library-access/library/view/-/9781264274901/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781264274901/?ar">https://learning.oreilly.com/library/view/~/9781264274901/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators ent://SD_ILS/0/SD_ILS:2313495 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Calderon, Paulino, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786467454/?ar">https://go.oreilly.com/library-access/library/view/-/9781786467454/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786467454/?ar">https://learning.oreilly.com/library/view/~/9781786467454/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 : certified ethical hacker version 11 practice tests ent://SD_ILS/0/SD_ILS:2330385 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools ent://SD_ILS/0/SD_ILS:2315386 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a> <a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments ent://SD_ILS/0/SD_ILS:2310257 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Allen, Lee (Information security specialist), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395810/?ar">https://learning.oreilly.com/library/view/~/9781784395810/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA PenTest+ study guide : exam PT0-002 ent://SD_ILS/0/SD_ILS:2331447 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Chapple, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119823810">https://learning.oreilly.com/library/view/~/9781119823810</a> <a href="https://learning.oreilly.com/library/view/~/9781119823810/?ar">https://learning.oreilly.com/library/view/~/9781119823810/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119823810/?ar">https://go.oreilly.com/library-access/library/view/-/9781119823810/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition ent://SD_ILS/0/SD_ILS:2331111 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Santos, Omar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137566204">https://learning.oreilly.com/library/view/~/9780137566204</a> <a href="https://learning.oreilly.com/library/view/~/9780137566204/?ar">https://learning.oreilly.com/library/view/~/9780137566204/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137566204/?ar">https://go.oreilly.com/library-access/library/view/-/9780137566204/?ar</a><br/>Format:&#160;Electronic Resources<br/> The car hacker's handbook : a guide for the penetration tester ent://SD_ILS/0/SD_ILS:2310098 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Smith, Craig (Reverse engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457198847">https://learning.oreilly.com/library/view/~/9781457198847</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457198847/?ar">https://go.oreilly.com/library-access/library/view/-/9781457198847/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457198847/?ar">https://learning.oreilly.com/library/view/~/9781457198847/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH v9 certified ethical hacker version 9 practice tests ent://SD_ILS/0/SD_ILS:2310669 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Blockmon, Raymond, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119252153/?ar">https://go.oreilly.com/library-access/library/view/-/9781119252153/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119252153">https://learning.oreilly.com/library/view/~/9781119252153</a> <a href="https://learning.oreilly.com/library/view/~/9781119252153/?ar">https://learning.oreilly.com/library/view/~/9781119252153/?ar</a><br/>Format:&#160;Electronic Resources<br/> Certified Ethical Hacker (CEH) Exam Cram ent://SD_ILS/0/SD_ILS:2330877 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Easttom, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137513697">https://learning.oreilly.com/library/view/~/9780137513697</a> <a href="https://learning.oreilly.com/library/view/~/9780137513697/?ar">https://learning.oreilly.com/library/view/~/9780137513697/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137513697/?ar">https://go.oreilly.com/library-access/library/view/-/9780137513697/?ar</a><br/>Format:&#160;Electronic Resources<br/> CEH Certified Ethical Hacker All-In-One Exam Guide. ent://SD_ILS/0/SD_ILS:2330831 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Walker, Matt.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269952">https://learning.oreilly.com/library/view/~/9781264269952</a> <a href="https://learning.oreilly.com/library/view/~/9781264269952/?ar">https://learning.oreilly.com/library/view/~/9781264269952/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781264269952/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269952/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacking and CompTIA PenTest+ exam prep (PT0-001) ent://SD_ILS/0/SD_ILS:2319320 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Solomon, Michael (Michael G.), 1963- on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838640019/?ar">https://go.oreilly.com/library-access/library/view/-/9781838640019/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838640019/?ar">https://learning.oreilly.com/videos/~/9781838640019/?ar</a><br/>Format:&#160;Electronic Resources<br/> CISSP 8 domains. ent://SD_ILS/0/SD_ILS:2332254 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619141">https://learning.oreilly.com/videos/~/9780996619141</a> <a href="https://learning.oreilly.com/videos/~/9780996619141/?ar">https://learning.oreilly.com/videos/~/9780996619141/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780996619141/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619141/?ar</a><br/>Format:&#160;Video recording<br/> Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing ent://SD_ILS/0/SD_ILS:2329942 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Sheikh, Ahmed.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484272589/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484272589/?ar">https://learning.oreilly.com/library/view/~/9781484272589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484272589">https://learning.oreilly.com/library/view/~/9781484272589</a><br/>Format:&#160;Electronic Resources<br/> CEH v11 certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:2329776 2025-07-17T00:21:50Z 2025-07-17T00:21:50Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format:&#160;Electronic Resources<br/>