Arama Sonuçları Tests d'intrusion.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dTests$002bd$002527intrusion.$0026ps$003d300?dt=list2025-07-17T00:21:50ZEthical hacking : understanding how the good guys find system and web app vulnerabilities before the bad guys doent://SD_ILS/0/SD_ILS:23130072025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491978375/?ar">https://go.oreilly.com/library-access/library/view/-/9781491978375/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491978375/?ar">https://learning.oreilly.com/videos/~/9781491978375/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : a hands-on introduction to breaking inent://SD_ILS/0/SD_ILS:23301062025-07-17T00:21:50Z2025-07-17T00:21:50Zby Graham, Daniel G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129095/?ar">https://learning.oreilly.com/library/view/~/9781098129095/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098129095/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129095/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129095">https://learning.oreilly.com/library/view/~/9781098129095</a><br/>Format: Electronic Resources<br/>Go h*ck yourself : a simple introduction to cyber attacks and defenseent://SD_ILS/0/SD_ILS:23299522025-07-17T00:21:50Z2025-07-17T00:21:50Zby Payne, Bryson, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129873/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129873/?ar">https://learning.oreilly.com/library/view/~/9781098129873/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129873">https://learning.oreilly.com/library/view/~/9781098129873</a><br/>Format: Electronic Resources<br/>Penetration testing with the Metasploit Framework : a quickstart guide to White Hat security discovery and exploitationent://SD_ILS/0/SD_ILS:23118252025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491972045/?ar">https://learning.oreilly.com/videos/~/9781491972045/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491972045/?ar">https://go.oreilly.com/library-access/library/view/-/9781491972045/?ar</a><br/>Format: Electronic Resources<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:23040402025-07-17T00:21:50Z2025-07-17T00:21:50Zby Crest.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285766/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285766/?ar">https://learning.oreilly.com/library/view/~/9781849285766/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285766">https://learning.oreilly.com/library/view/~/9781849285766</a><br/>Format: Electronic Resources<br/>Beginning ethical hacking with Kali Linux : computational techniques for resolving security issuesent://SD_ILS/0/SD_ILS:23182112025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sinha, Sanjib, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484238912">https://learning.oreilly.com/library/view/~/9781484238912</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484238912/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238912/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238912/?ar">https://learning.oreilly.com/library/view/~/9781484238912/?ar</a><br/>Format: Electronic Resources<br/>HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATIONent://SD_ILS/0/SD_ILS:23244492025-07-17T00:21:50Z2025-07-17T00:21:50Zby HARPREET SINGH; HIMANSHU SHARMA.<br/><a href="https://learning.oreilly.com/library/view/~/9781789953527/?ar">https://learning.oreilly.com/library/view/~/9781789953527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789953527">https://learning.oreilly.com/library/view/~/9781789953527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789953527/?ar">https://go.oreilly.com/library-access/library/view/-/9781789953527/?ar</a><br/>Format: Electronic Resources<br/>Reverse engineering and exploit development : application penetration testing for security professionalsent://SD_ILS/0/SD_ILS:23072262025-07-17T00:21:50Z2025-07-17T00:21:50Zby Polstra, Philip, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781771373654/?ar">https://learning.oreilly.com/videos/~/9781771373654/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771373654/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373654/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux Penetration Testing Bibleent://SD_ILS/0/SD_ILS:23287732025-07-17T00:21:50Z2025-07-17T00:21:50Zby Khawaja, Gus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119719083">https://learning.oreilly.com/library/view/~/9781119719083</a>
<a href="https://learning.oreilly.com/library/view/~/9781119719083/?ar">https://learning.oreilly.com/library/view/~/9781119719083/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119719083/?ar">https://go.oreilly.com/library-access/library/view/-/9781119719083/?ar</a><br/>Format: Electronic Resources<br/>Hacking mit Metasploit : Das umfassende Handbuch zu Penetration Testing und Metasploitent://SD_ILS/0/SD_ILS:23151672025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messner, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492065470/?ar">https://go.oreilly.com/library-access/library/view/-/9781492065470/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492065470/?ar">https://learning.oreilly.com/library/view/~/9781492065470/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing services procurement guide. Version 1.ent://SD_ILS/0/SD_ILS:23040372025-07-17T00:21:50Z2025-07-17T00:21:50Zby Creasey, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285803/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285803/?ar">https://learning.oreilly.com/library/view/~/9781849285803/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285803">https://learning.oreilly.com/library/view/~/9781849285803</a><br/>Format: Electronic Resources<br/>Coding for penetration testers : building better toolsent://SD_ILS/0/SD_ILS:23118742025-07-17T00:21:50Z2025-07-17T00:21:50Zby Andress, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128054734/?ar">https://go.oreilly.com/library-access/library/view/-/9780128054734/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128054734/?ar">https://learning.oreilly.com/library/view/~/9780128054734/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführenent://SD_ILS/0/SD_ILS:23213482025-07-17T00:21:50Z2025-07-17T00:21:50Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2018 : assuring security by penetration testing : unleash the full potential of Kali Linux 2018, now with updated toolsent://SD_ILS/0/SD_ILS:23181592025-07-17T00:21:50Z2025-07-17T00:21:50Zby Parasram, Shiva V. N., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789341768/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789341768/?ar">https://learning.oreilly.com/library/view/~/9781789341768/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2018 : Windows penetration testing : conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018ent://SD_ILS/0/SD_ILS:23181572025-07-17T00:21:50Z2025-07-17T00:21:50Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788997461/?ar">https://learning.oreilly.com/library/view/~/9781788997461/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788997461/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997461/?ar</a><br/>Format: Electronic Resources<br/>Bug bounty hunting essentials : quick-paced guide to help white-hat hackers get through bug bounty programsent://SD_ILS/0/SD_ILS:23186432025-07-17T00:21:50Z2025-07-17T00:21:50Zby Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788626897/?ar">https://learning.oreilly.com/library/view/~/9781788626897/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788626897">https://learning.oreilly.com/library/view/~/9781788626897</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788626897/?ar">https://go.oreilly.com/library-access/library/view/-/9781788626897/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing mit Metasploit : Eine praktische Einführungent://SD_ILS/0/SD_ILS:22979132025-07-17T00:21:50Z2025-07-17T00:21:50Zby Neugebauer, Frank.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar">https://go.oreilly.com/library-access/library/view/-/9781457174933/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457174933/?ar">https://learning.oreilly.com/library/view/~/9781457174933/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux web penetration testing cookbook : identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.xent://SD_ILS/0/SD_ILS:23175062025-07-17T00:21:50Z2025-07-17T00:21:50Zby Nájera-Gutiérrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788991513/?ar">https://learning.oreilly.com/library/view/~/9781788991513/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788991513/?ar">https://go.oreilly.com/library-access/library/view/-/9781788991513/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux : testy bezpieczeństwa, testy penetracyjne i etyczne hakowanieent://SD_ILS/0/SD_ILS:23259452025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098124977/?ar">https://go.oreilly.com/library-access/library/view/-/9781098124977/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098124977/?ar">https://learning.oreilly.com/library/view/~/9781098124977/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098124977">https://learning.oreilly.com/library/view/~/9781098124977</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing with Python : enhance your ethical hacking skills to build automated and intelligent systemsent://SD_ILS/0/SD_ILS:23188172025-07-17T00:21:50Z2025-07-17T00:21:50Zby Khan, Furqan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788990820/?ar">https://learning.oreilly.com/library/view/~/9781788990820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990820">https://learning.oreilly.com/library/view/~/9781788990820</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788990820/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990820/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with Raspberry Pi : construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pient://SD_ILS/0/SD_ILS:23062262025-07-17T00:21:50Z2025-07-17T00:21:50Zby Muniz, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784396435">https://learning.oreilly.com/library/view/~/9781784396435</a>
<a href="https://learning.oreilly.com/library/view/~/9781784396435/?ar">https://learning.oreilly.com/library/view/~/9781784396435/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784396435/?ar">https://go.oreilly.com/library-access/library/view/-/9781784396435/?ar</a><br/>Format: Electronic Resources<br/>Learning iOS penetration testing : secure your iOS applications and uncover hidden vunerabilities by conducting penetration testsent://SD_ILS/0/SD_ILS:23096902025-07-17T00:21:50Z2025-07-17T00:21:50Zby Yermalkar, Swaroop, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883255/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883255/?ar">https://learning.oreilly.com/library/view/~/9781785883255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883255">https://learning.oreilly.com/library/view/~/9781785883255</a><br/>Format: Electronic Resources<br/>Computer and information security handbook, second editionent://SD_ILS/0/SD_ILS:23001972025-07-17T00:21:50Z2025-07-17T00:21:50Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar">https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123943972/?ar">https://learning.oreilly.com/library/view/~/9780123943972/?ar</a><br/>Format: Electronic Resources<br/>The art of hacking (video collection)ent://SD_ILS/0/SD_ILS:23198842025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar">https://go.oreilly.com/library-access/library/view/-/9780135767849/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780135767849/?ar">https://learning.oreilly.com/videos/~/9780135767849/?ar</a><br/>Format: Electronic Resources<br/>Security penetration testing (The art of hacking series)ent://SD_ILS/0/SD_ILS:23141022025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar">https://go.oreilly.com/library-access/library/view/-/9780134833989/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134833989/?ar">https://learning.oreilly.com/videos/~/9780134833989/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with Raspberry Pi : learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2ent://SD_ILS/0/SD_ILS:23122362025-07-17T00:21:50Z2025-07-17T00:21:50Zby McPhee, Michael (systems engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787126138/?ar">https://learning.oreilly.com/library/view/~/9781787126138/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787126138/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126138/?ar</a><br/>Format: Electronic Resources<br/>Practical IoT hacking : the definitive guide to attacking the internet of thingsent://SD_ILS/0/SD_ILS:23252022025-07-17T00:21:50Z2025-07-17T00:21:50Zby Chantzis, Fotios, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128876/?ar">https://learning.oreilly.com/library/view/~/9781098128876/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128876/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128876/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128876">https://learning.oreilly.com/library/view/~/9781098128876</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:23153842025-07-17T00:21:50Z2025-07-17T00:21:50Zby Oriyano, Sean-Philip, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554089/?ar">https://learning.oreilly.com/library/view/~/9781783554089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554089">https://learning.oreilly.com/library/view/~/9781783554089</a><br/>Format: Electronic Resources<br/>Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the jobent://SD_ILS/0/SD_ILS:23057382025-07-17T00:21:50Z2025-07-17T00:21:50Zby Mahajan, Akash, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783550111">https://learning.oreilly.com/library/view/~/9781783550111</a>
<a href="https://learning.oreilly.com/library/view/~/9781783550111/?ar">https://learning.oreilly.com/library/view/~/9781783550111/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar">https://go.oreilly.com/library-access/library/view/-/9781783550111/?ar</a><br/>Format: Electronic Resources<br/>Hacking und Bug Huntingent://SD_ILS/0/SD_ILS:23262892025-07-17T00:21:50Z2025-07-17T00:21:50Zby Yaworski, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9781098124656">https://learning.oreilly.com/library/view/~/9781098124656</a>
<a href="https://learning.oreilly.com/library/view/~/9781098124656/?ar">https://learning.oreilly.com/library/view/~/9781098124656/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098124656/?ar">https://go.oreilly.com/library-access/library/view/-/9781098124656/?ar</a><br/>Format: Electronic Resources<br/>Python penetration testing cookbook : practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitationent://SD_ILS/0/SD_ILS:23150782025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rehim, Rejah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784399771">https://learning.oreilly.com/library/view/~/9781784399771</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784399771/?ar">https://go.oreilly.com/library-access/library/view/-/9781784399771/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784399771/?ar">https://learning.oreilly.com/library/view/~/9781784399771/?ar</a><br/>Format: Electronic Resources<br/>Python ethical hacking from scratch : think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malwareent://SD_ILS/0/SD_ILS:23291522025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sarwar, Fahad Ali.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838829506/?ar">https://go.oreilly.com/library-access/library/view/-/9781838829506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838829506/?ar">https://learning.oreilly.com/library/view/~/9781838829506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838829506">https://learning.oreilly.com/library/view/~/9781838829506</a><br/>Format: Electronic Resources<br/>Kali Linux web penetration testing cookbook : over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2ent://SD_ILS/0/SD_ILS:23101082025-07-17T00:21:50Z2025-07-17T00:21:50Zby Nájera-Gutiérrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784392918">https://learning.oreilly.com/library/view/~/9781784392918</a>
<a href="https://learning.oreilly.com/library/view/~/9781784392918/?ar">https://learning.oreilly.com/library/view/~/9781784392918/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784392918/?ar">https://go.oreilly.com/library-access/library/view/-/9781784392918/?ar</a><br/>Format: Electronic Resources<br/>Advanced white hat hacking and penetration testingent://SD_ILS/0/SD_ILS:22998252025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370998/?ar">https://learning.oreilly.com/videos/~/9781771370998/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771370998/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370998/?ar</a><br/>Format: Electronic Resources<br/>Introduction to penetration testing : finding and analyzing vulnerabilities in systems and networks with Kali Linuxent://SD_ILS/0/SD_ILS:23095322025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375245/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771375245/?ar">https://learning.oreilly.com/videos/~/9781771375245/?ar</a><br/>Format: Electronic Resources<br/>Black Hat Go : Go programming for hackers and pentestersent://SD_ILS/0/SD_ILS:23224692025-07-17T00:21:50Z2025-07-17T00:21:50Zby Steele, Tom (Security Consultant), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122645/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122645">https://learning.oreilly.com/library/view/~/9781098122645</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122645/?ar">https://learning.oreilly.com/library/view/~/9781098122645/?ar</a><br/>Format: Electronic Resources<br/>Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploitent://SD_ILS/0/SD_ILS:23180792025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242704/?ar">https://learning.oreilly.com/library/view/~/9781484242704/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242704/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242704/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242704">https://learning.oreilly.com/library/view/~/9781484242704</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skillsent://SD_ILS/0/SD_ILS:23320622025-07-17T00:21:50Z2025-07-17T00:21:50Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801819770">https://learning.oreilly.com/library/view/~/9781801819770</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar">https://go.oreilly.com/library-access/library/view/-/9781801819770/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801819770/?ar">https://learning.oreilly.com/library/view/~/9781801819770/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23162552025-07-17T00:21:50Z2025-07-17T00:21:50Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format: Electronic Resources<br/>Mobile application penetration testing : explore real-world threat scenarios, attacks on mobile applications, and ways to counter thement://SD_ILS/0/SD_ILS:23101992025-07-17T00:21:50Z2025-07-17T00:21:50Zby Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883378/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883378/?ar">https://learning.oreilly.com/library/view/~/9781785883378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883378">https://learning.oreilly.com/library/view/~/9781785883378</a><br/>Format: Electronic Resources<br/>Hacking mit Metasploit : Das umfassende handbuch zu penetration testing und metasploitent://SD_ILS/0/SD_ILS:23069692025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messner, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457194221/?ar">https://learning.oreilly.com/library/view/~/9781457194221/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457194221/?ar">https://go.oreilly.com/library-access/library/view/-/9781457194221/?ar</a><br/>Format: Electronic Resources<br/>Mastering Metasploit - Fourth Editionent://SD_ILS/0/SD_ILS:23261522025-07-17T00:21:50Z2025-07-17T00:21:50Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838980078/?ar">https://go.oreilly.com/library-access/library/view/-/9781838980078/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838980078">https://learning.oreilly.com/library/view/~/9781838980078</a>
<a href="https://learning.oreilly.com/library/view/~/9781838980078/?ar">https://learning.oreilly.com/library/view/~/9781838980078/?ar</a><br/>Format: Electronic Resources<br/>Professional guide to wireless network hacking and penetration testingent://SD_ILS/0/SD_ILS:23068612025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771373555/?ar">https://go.oreilly.com/library-access/library/view/-/9781771373555/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771373555/?ar">https://learning.oreilly.com/videos/~/9781771373555/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linuxent://SD_ILS/0/SD_ILS:23030672025-07-17T00:21:50Z2025-07-17T00:21:50Zby Allen, Lee (Information security specialist)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519489/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519489/?ar">https://learning.oreilly.com/library/view/~/9781849519489/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519489">https://learning.oreilly.com/library/view/~/9781849519489</a><br/>Format: Electronic Resources<br/>Learning network penetration testing with Kali Linuxent://SD_ILS/0/SD_ILS:23171022025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gradisteanu, Cristian, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787129481/?ar">https://learning.oreilly.com/videos/~/9781787129481/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787129481/?ar">https://go.oreilly.com/library-access/library/view/-/9781787129481/?ar</a><br/>Format: Electronic Resources<br/>Security testing and ethical hacking with Kali Linuxent://SD_ILS/0/SD_ILS:23156092025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492029328/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029328/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492029328/?ar">https://learning.oreilly.com/videos/~/9781492029328/?ar</a><br/>Format: Electronic Resources<br/>Python for offensive PenTest : a practical guide to ethical hacking and penetration testing using Pythonent://SD_ILS/0/SD_ILS:23164952025-07-17T00:21:50Z2025-07-17T00:21:50Zby Khrais, Hussam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788838979/?ar">https://go.oreilly.com/library-access/library/view/-/9781788838979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788838979/?ar">https://learning.oreilly.com/library/view/~/9781788838979/?ar</a><br/>Format: Electronic Resources<br/>Metasploit : Das Handbuch zum Penetration-Testing-Framework.ent://SD_ILS/0/SD_ILS:22951142025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messner, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170850/?ar">https://learning.oreilly.com/library/view/~/9781457170850/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457170850/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170850/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkitent://SD_ILS/0/SD_ILS:23191142025-07-17T00:21:50Z2025-07-17T00:21:50Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementationent://SD_ILS/0/SD_ILS:23137412025-07-17T00:21:50Z2025-07-17T00:21:50Zby McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenalent://SD_ILS/0/SD_ILS:23138032025-07-17T00:21:50Z2025-07-17T00:21:50Zby Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.ent://SD_ILS/0/SD_ILS:23126192025-07-17T00:21:50Z2025-07-17T00:21:50Zby Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format: Electronic Resources<br/>Metasploit Penetration Testing Cookbook.ent://SD_ILS/0/SD_ILS:22951092025-07-17T00:21:50Z2025-07-17T00:21:50Zby Singh, Abhinav.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849517423/?ar">https://go.oreilly.com/library-access/library/view/-/9781849517423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849517423/?ar">https://learning.oreilly.com/library/view/~/9781849517423/?ar</a><br/>Format: Electronic Resources<br/>Coding for penetration testers : building better toolsent://SD_ILS/0/SD_ILS:22954512025-07-17T00:21:50Z2025-07-17T00:21:50Zby Andress, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497305/?ar">https://learning.oreilly.com/library/view/~/9781597497305/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar</a><br/>Format: Electronic Resources<br/>Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suiteent://SD_ILS/0/SD_ILS:23177232025-07-17T00:21:50Z2025-07-17T00:21:50Zby Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a>
<a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing : a hands-on introduction to hackingent://SD_ILS/0/SD_ILS:23044112025-07-17T00:21:50Z2025-07-17T00:21:50Zby Weidman, Georgia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457185342/?ar">https://learning.oreilly.com/library/view/~/9781457185342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185342/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185342">https://learning.oreilly.com/library/view/~/9781457185342</a><br/>Format: Electronic Resources<br/>Learn social engineering from scratchent://SD_ILS/0/SD_ILS:23166002025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789341584/?ar">https://learning.oreilly.com/videos/~/9781789341584/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341584/?ar</a><br/>Format: Electronic Resources<br/>Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and moreent://SD_ILS/0/SD_ILS:23170032025-07-17T00:21:50Z2025-07-17T00:21:50Zby Khawaja, Gus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624039/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624039/?ar">https://learning.oreilly.com/library/view/~/9781788624039/?ar</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and learning in a hacking labent://SD_ILS/0/SD_ILS:22994832025-07-17T00:21:50Z2025-07-17T00:21:50Zby Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format: Electronic Resources<br/>The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easyent://SD_ILS/0/SD_ILS:22995202025-07-17T00:21:50Z2025-07-17T00:21:50Zby Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format: Electronic Resources<br/>Bug bounty bootcamp : the guide to finding and reporting web vulnerabilitiesent://SD_ILS/0/SD_ILS:23293402025-07-17T00:21:50Z2025-07-17T00:21:50Zby Li, Vickie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129088/?ar">https://learning.oreilly.com/library/view/~/9781098129088/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129088">https://learning.oreilly.com/library/view/~/9781098129088</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098129088/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129088/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing Azure for Ethical Hackersent://SD_ILS/0/SD_ILS:23310772025-07-17T00:21:50Z2025-07-17T00:21:50Zby Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Electronic Resources<br/>Bayesian methods for hackers : probabilistic programming and Bayesian inferenceent://SD_ILS/0/SD_ILS:23087202025-07-17T00:21:50Z2025-07-17T00:21:50Zby Davidson-Pilon, Cameron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133902914/?ar">https://learning.oreilly.com/library/view/~/9780133902914/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133902914/?ar">https://go.oreilly.com/library-access/library/view/-/9780133902914/?ar</a><br/>Format: Electronic Resources<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:22985292025-07-17T00:21:50Z2025-07-17T00:21:50Zby Neely, Matthew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497312/?ar">https://learning.oreilly.com/library/view/~/9781597497312/?ar</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:22930572025-07-17T00:21:50Z2025-07-17T00:21:50Zby Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format: Electronic Resources<br/>Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing frameworkent://SD_ILS/0/SD_ILS:23160882025-07-17T00:21:50Z2025-07-17T00:21:50Zby Teixeira, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623179/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623179/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623179/?ar">https://learning.oreilly.com/library/view/~/9781788623179/?ar</a><br/>Format: Electronic Resources<br/>Privilege Escalation Techniquesent://SD_ILS/0/SD_ILS:23311202025-07-17T00:21:50Z2025-07-17T00:21:50Zby Ahmed, Alexis, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801078870/?ar">https://learning.oreilly.com/library/view/~/9781801078870/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801078870/?ar">https://go.oreilly.com/library-access/library/view/-/9781801078870/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801078870">https://learning.oreilly.com/library/view/~/9781801078870</a><br/>Format: Electronic Resources<br/>The pentester blueprint : starting a career as an ethical hackerent://SD_ILS/0/SD_ILS:23260222025-07-17T00:21:50Z2025-07-17T00:21:50Zby Wylie, Phillip L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119684305/?ar">https://learning.oreilly.com/library/view/~/9781119684305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119684305">https://learning.oreilly.com/library/view/~/9781119684305</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119684305/?ar">https://go.oreilly.com/library-access/library/view/-/9781119684305/?ar</a><br/>Format: Electronic Resources<br/>Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wiresharkent://SD_ILS/0/SD_ILS:23237682025-07-17T00:21:50Z2025-07-17T00:21:50Zby Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Electronic Resources<br/>Learning Python web penetration testing : automate web penetration testing activities using Pythonent://SD_ILS/0/SD_ILS:23170262025-07-17T00:21:50Z2025-07-17T00:21:50Zby Martorella, Christian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789533972/?ar">https://learning.oreilly.com/library/view/~/9781789533972/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar">https://go.oreilly.com/library-access/library/view/-/9781789533972/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the goent://SD_ILS/0/SD_ILS:23193612025-07-17T00:21:50Z2025-07-17T00:21:50Zby Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linuxent://SD_ILS/0/SD_ILS:23100362025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a>
<a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format: Electronic Resources<br/>Real-world bug hunting : a field guide to web hackingent://SD_ILS/0/SD_ILS:23184282025-07-17T00:21:50Z2025-07-17T00:21:50Zby Yaworski, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098122508">https://learning.oreilly.com/library/view/~/9781098122508</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122508/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122508/?ar">https://learning.oreilly.com/library/view/~/9781098122508/?ar</a><br/>Format: Electronic Resources<br/>Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.ent://SD_ILS/0/SD_ILS:23153202025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Electronic Resources<br/>The hardware hacking handbook : breaking embedded security with hardware attacksent://SD_ILS/0/SD_ILS:23294442025-07-17T00:21:50Z2025-07-17T00:21:50Zby Woudenberg, Jasper van, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129835/?ar">https://learning.oreilly.com/library/view/~/9781098129835/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129835">https://learning.oreilly.com/library/view/~/9781098129835</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129835/?ar</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:23270772025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>Learning Kali Linux : security testing, penetration testing, and ethical hackingent://SD_ILS/0/SD_ILS:23169782025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680/?ar">https://learning.oreilly.com/library/view/~/9781492028680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028680">https://learning.oreilly.com/library/view/~/9781492028680</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:23138402025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>IoT-Hacking : Sicherheitslücken im Internet der Dinge erkennen und schliessenent://SD_ILS/0/SD_ILS:23102512025-07-17T00:21:50Z2025-07-17T00:21:50Zby Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457199752">https://learning.oreilly.com/library/view/~/9781457199752</a>
<a href="https://learning.oreilly.com/library/view/~/9781457199752/?ar">https://learning.oreilly.com/library/view/~/9781457199752/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar">https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar</a><br/>Format: Electronic Resources<br/>Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applicationsent://SD_ILS/0/SD_ILS:23193602025-07-17T00:21:50Z2025-07-17T00:21:50Zby Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Electronic Resources<br/>Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!ent://SD_ILS/0/SD_ILS:23118962025-07-17T00:21:50Z2025-07-17T00:21:50Zby Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format: Electronic Resources<br/>Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessonsent://SD_ILS/0/SD_ILS:23215502025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134854779/?ar">https://learning.oreilly.com/videos/~/9780134854779/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar">https://go.oreilly.com/library-access/library/view/-/9780134854779/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : learning the basicsent://SD_ILS/0/SD_ILS:23185272025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243480/?ar">https://learning.oreilly.com/videos/~/9781484243480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243480/?ar</a><br/>Format: Electronic Resources<br/>BackTrack 4 : assuring security by penetration testingent://SD_ILS/0/SD_ILS:22938712025-07-17T00:21:50Z2025-07-17T00:21:50Zby Ali, Shakeel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar">https://go.oreilly.com/library-access/library/view/-/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944/?ar">https://learning.oreilly.com/library/view/~/9781849513944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849513944">https://learning.oreilly.com/library/view/~/9781849513944</a><br/>Format: Electronic Resources<br/>Penetration testing : a guide for business and it managers.ent://SD_ILS/0/SD_ILS:23217082025-07-17T00:21:50Z2025-07-17T00:21:50Z<a href="https://learning.oreilly.com/library/view/~/9781780174082/?ar">https://learning.oreilly.com/library/view/~/9781780174082/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174082/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174082">https://learning.oreilly.com/library/view/~/9781780174082</a><br/>Format: Electronic Resources<br/>Learn website hacking : penetration testing from scratchent://SD_ILS/0/SD_ILS:23164342025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346145/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789346145/?ar">https://learning.oreilly.com/videos/~/9781789346145/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:23146732025-07-17T00:21:50Z2025-07-17T00:21:50Zby Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format: Electronic Resources<br/>CISO's guide to penetration testing : a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:22933662025-07-17T00:21:50Z2025-07-17T00:21:50Zby Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar">https://go.oreilly.com/library-access/library/view/-/9781439880289/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439880289/?ar">https://learning.oreilly.com/library/view/~/9781439880289/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : orchestrating attacksent://SD_ILS/0/SD_ILS:23185102025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gupta, Sunil, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243404/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781484243404/?ar">https://learning.oreilly.com/videos/~/9781484243404/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking : networks and websitesent://SD_ILS/0/SD_ILS:23185112025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781484243411/?ar">https://learning.oreilly.com/videos/~/9781484243411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243411/?ar</a><br/>Format: Electronic Resources<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:23185542025-07-17T00:21:50Z2025-07-17T00:21:50Zby OccupyTheWeb, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492069485/?ar">https://learning.oreilly.com/library/view/~/9781492069485/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069485/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069485">https://learning.oreilly.com/library/view/~/9781492069485</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23116042025-07-17T00:21:50Z2025-07-17T00:21:50Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar">https://go.oreilly.com/library-access/library/view/-/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166/?ar">https://learning.oreilly.com/library/view/~/9781786463166/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786463166">https://learning.oreilly.com/library/view/~/9781786463166</a><br/>Format: Electronic Resources<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:23030922025-07-17T00:21:50Z2025-07-17T00:21:50Zby Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Electronic Resources<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:23019462025-07-17T00:21:50Z2025-07-17T00:21:50Zby Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>WiFi hacking : wireless penetration testing for beginnersent://SD_ILS/0/SD_ILS:23167722025-07-17T00:21:50Z2025-07-17T00:21:50Zby Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530193/?ar">https://learning.oreilly.com/videos/~/9781789530193/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530193/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking masterclassent://SD_ILS/0/SD_ILS:23177482025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gupta, Sunil, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781789530018/?ar">https://learning.oreilly.com/videos/~/9781789530018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530018/?ar</a><br/>Format: Electronic Resources<br/>Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormationent://SD_ILS/0/SD_ILS:23214092025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Electronic Resources<br/>Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linuxent://SD_ILS/0/SD_ILS:23159982025-07-17T00:21:50Z2025-07-17T00:21:50Zby Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format: Electronic Resources<br/>How to hack like a ghostent://SD_ILS/0/SD_ILS:23265072025-07-17T00:21:50Z2025-07-17T00:21:50Zby Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:23172592025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sabih, Zaid, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar">https://go.oreilly.com/library-access/library/view/-/9781788622059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059">https://learning.oreilly.com/library/view/~/9781788622059</a>
<a href="https://learning.oreilly.com/library/view/~/9781788622059/?ar">https://learning.oreilly.com/library/view/~/9781788622059/?ar</a><br/>Format: Electronic Resources<br/>CEH Certified Ethical Hacker Cert guideent://SD_ILS/0/SD_ILS:23316212025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratchent://SD_ILS/0/SD_ILS:23169232025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sabih, Zaid, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340297/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789340297/?ar">https://learning.oreilly.com/videos/~/9781789340297/?ar</a><br/>Format: Electronic Resources<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux tutorial for beginnersent://SD_ILS/0/SD_ILS:23175792025-07-17T00:21:50Z2025-07-17T00:21:50Zby Naja, Tarek, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar">https://go.oreilly.com/library-access/library/view/-/9781789615173/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789615173/?ar">https://learning.oreilly.com/videos/~/9781789615173/?ar</a><br/>Format: Electronic Resources<br/>GPEN GIAC Certified Penetration Tester All-In-One Exam Guideent://SD_ILS/0/SD_ILS:23265342025-07-17T00:21:50Z2025-07-17T00:21:50Zby Nutting, Raymond.<br/><a href="https://learning.oreilly.com/library/view/~/9781260456752">https://learning.oreilly.com/library/view/~/9781260456752</a>
<a href="https://learning.oreilly.com/library/view/~/9781260456752/?ar">https://learning.oreilly.com/library/view/~/9781260456752/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260456752/?ar">https://go.oreilly.com/library-access/library/view/-/9781260456752/?ar</a><br/>Format: Electronic Resources<br/>Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsent://SD_ILS/0/SD_ILS:23110222025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format: Electronic Resources<br/>Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flawsent://SD_ILS/0/SD_ILS:23178232025-07-17T00:21:50Z2025-07-17T00:21:50Zby Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format: Electronic Resources<br/>Pentesting Azure applications : the definitive guide to testing and securing deploymentsent://SD_ILS/0/SD_ILS:23174132025-07-17T00:21:50Z2025-07-17T00:21:50Zby Burrough, Matt, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar">https://go.oreilly.com/library-access/library/view/-/9781492069416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069416/?ar">https://learning.oreilly.com/library/view/~/9781492069416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492069416">https://learning.oreilly.com/library/view/~/9781492069416</a><br/>Format: Electronic Resources<br/>Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.ent://SD_ILS/0/SD_ILS:23308642025-07-17T00:21:50Z2025-07-17T00:21:50Zby Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : techniques for ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23167342025-07-17T00:21:50Z2025-07-17T00:21:50Zby Mohit, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789138962/?ar">https://learning.oreilly.com/library/view/~/9781789138962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar">https://go.oreilly.com/library-access/library/view/-/9781789138962/?ar</a><br/>Format: Electronic Resources<br/>Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessusent://SD_ILS/0/SD_ILS:23167002025-07-17T00:21:50Z2025-07-17T00:21:50Zby Chauhan, Ajay Singh, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar">https://go.oreilly.com/library-access/library/view/-/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235/?ar">https://learning.oreilly.com/library/view/~/9781788839235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788839235">https://learning.oreilly.com/library/view/~/9781788839235</a><br/>Format: Electronic Resources<br/>Penetration testing : protecting networks and systemsent://SD_ILS/0/SD_ILS:22958982025-07-17T00:21:50Z2025-07-17T00:21:50Zby Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:23165462025-07-17T00:21:50Z2025-07-17T00:21:50Zby Ozkaya, Erdal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar">https://go.oreilly.com/library-access/library/view/-/9781788837927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788837927/?ar">https://learning.oreilly.com/library/view/~/9781788837927/?ar</a><br/>Format: Electronic Resources<br/>Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Pythonent://SD_ILS/0/SD_ILS:23170352025-07-17T00:21:50Z2025-07-17T00:21:50Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar">https://go.oreilly.com/library-access/library/view/-/9781788997409/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788997409/?ar">https://learning.oreilly.com/library/view/~/9781788997409/?ar</a><br/>Format: Electronic Resources<br/>The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empireent://SD_ILS/0/SD_ILS:23318782025-07-17T00:21:50Z2025-07-17T00:21:50Zby Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801818933">https://learning.oreilly.com/library/view/~/9781801818933</a>
<a href="https://learning.oreilly.com/library/view/~/9781801818933/?ar">https://learning.oreilly.com/library/view/~/9781801818933/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar">https://go.oreilly.com/library-access/library/view/-/9781801818933/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing bootcamp : quickly get up and running with pentesting techniquesent://SD_ILS/0/SD_ILS:23137462025-07-17T00:21:50Z2025-07-17T00:21:50Zby Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:23034752025-07-17T00:21:50Z2025-07-17T00:21:50Zby Jaswal, Nipun.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar">https://go.oreilly.com/library-access/library/view/-/9781782162223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782162223/?ar">https://learning.oreilly.com/library/view/~/9781782162223/?ar</a><br/>Format: Electronic Resources<br/>Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linuxent://SD_ILS/0/SD_ILS:23322652025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar">https://go.oreilly.com/library-access/library/view/-/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750/?ar">https://learning.oreilly.com/videos/~/9781803239750/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803239750">https://learning.oreilly.com/videos/~/9781803239750</a><br/>Format: Video recording<br/>Learn man in the middle attacks from scratch.ent://SD_ILS/0/SD_ILS:23322692025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sarraj, Saad, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar">https://go.oreilly.com/library-access/library/view/-/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245/?ar">https://learning.oreilly.com/videos/~/9781803243245/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781803243245">https://learning.oreilly.com/videos/~/9781803243245</a><br/>Format: Video recording<br/>Web hacking : become a professional web pentesterent://SD_ILS/0/SD_ILS:23198312025-07-17T00:21:50Z2025-07-17T00:21:50Zby Revay, Geri, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781838822644/?ar">https://learning.oreilly.com/videos/~/9781838822644/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822644/?ar</a><br/>Format: Electronic Resources<br/>Becoming the hacker : the playbook for getting inside the mind of an attackerent://SD_ILS/0/SD_ILS:23191292025-07-17T00:21:50Z2025-07-17T00:21:50Zby Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:23134992025-07-17T00:21:50Z2025-07-17T00:21:50Zby Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Electronic Resources<br/>Digital forensics for pentesters : hands-on learning.ent://SD_ILS/0/SD_ILS:23319692025-07-17T00:21:50Z2025-07-17T00:21:50Zby Krahenbill, Cliff, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781803231969">https://learning.oreilly.com/videos/~/9781803231969</a>
<a href="https://learning.oreilly.com/videos/~/9781803231969/?ar">https://learning.oreilly.com/videos/~/9781803231969/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar">https://go.oreilly.com/library-access/library/view/-/9781803231969/?ar</a><br/>Format: Video recording<br/>Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Linux and Metasploitent://SD_ILS/0/SD_ILS:23222412025-07-17T00:21:50Z2025-07-17T00:21:50Zby Najera-Gutierrez, Gilberto, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781838646073">https://learning.oreilly.com/library/view/~/9781838646073</a>
<a href="https://learning.oreilly.com/library/view/~/9781838646073/?ar">https://learning.oreilly.com/library/view/~/9781838646073/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar">https://go.oreilly.com/library-access/library/view/-/9781838646073/?ar</a><br/>Format: Electronic Resources<br/>Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration testsent://SD_ILS/0/SD_ILS:23086402025-07-17T00:21:50Z2025-07-17T00:21:50Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format: Electronic Resources<br/>An quan shen tou ce shi.ent://SD_ILS/0/SD_ILS:23324372025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882021010401/?ar">https://learning.oreilly.com/videos/~/8882021010401/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010401">https://learning.oreilly.com/videos/~/8882021010401</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010401/?ar</a><br/>Format: Video recording<br/>Practical social engineering : a primer for the ethical hackerent://SD_ILS/0/SD_ILS:23282342025-07-17T00:21:50Z2025-07-17T00:21:50Zby Gray, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130213/?ar">https://learning.oreilly.com/library/view/~/9781098130213/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130213/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098130213">https://learning.oreilly.com/library/view/~/9781098130213</a><br/>Format: Electronic Resources<br/>Hands on hackingent://SD_ILS/0/SD_ILS:23254522025-07-17T00:21:50Z2025-07-17T00:21:50Zby Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:23146832025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:23172312025-07-17T00:21:50Z2025-07-17T00:21:50Zby Bramwell, Phil, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295666/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666">https://learning.oreilly.com/library/view/~/9781788295666</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295666/?ar">https://learning.oreilly.com/library/view/~/9781788295666/?ar</a><br/>Format: Electronic Resources<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:23007192025-07-17T00:21:50Z2025-07-17T00:21:50Zby Hagar, Jon Duncan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar">https://go.oreilly.com/library-access/library/view/-/9781466575318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466575318/?ar">https://learning.oreilly.com/library/view/~/9781466575318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466575318">https://learning.oreilly.com/library/view/~/9781466575318</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:23160892025-07-17T00:21:50Z2025-07-17T00:21:50Zby Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Electronic Resources<br/>Technische IT-Security für IT Security Manager : Von Cloud Computing über WLAN bis zu Penetrationstestsent://SD_ILS/0/SD_ILS:23185372025-07-17T00:21:50Z2025-07-17T00:21:50Zby Harich, Thomas W., author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958454439/?ar">https://learning.oreilly.com/library/view/~/9783958454439/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar">https://go.oreilly.com/library-access/library/view/-/9783958454439/?ar</a><br/>Format: Electronic Resources<br/>IoT penetration testing cookbook : identify vulnerabilities and secure your smart devicesent://SD_ILS/0/SD_ILS:23150992025-07-17T00:21:50Z2025-07-17T00:21:50Zby Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:23133012025-07-17T00:21:50Z2025-07-17T00:21:50Zby Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>Metasploit : the penetration tester's guideent://SD_ILS/0/SD_ILS:22925812025-07-17T00:21:50Z2025-07-17T00:21:50Zby Kennedy, David, 1982-<br/><a href="https://learning.oreilly.com/library/view/~/9781593272883">https://learning.oreilly.com/library/view/~/9781593272883</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272883/?ar">https://learning.oreilly.com/library/view/~/9781593272883/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272883/?ar</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:23033122025-07-17T00:21:50Z2025-07-17T00:21:50Zby Makan, Keith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar">https://go.oreilly.com/library-access/library/view/-/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107/?ar">https://learning.oreilly.com/library/view/~/9781849695107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849695107">https://learning.oreilly.com/library/view/~/9781849695107</a><br/>Format: Electronic Resources<br/>Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:23167902025-07-17T00:21:50Z2025-07-17T00:21:50Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar">https://go.oreilly.com/library-access/library/view/-/9781788990615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788990615/?ar">https://learning.oreilly.com/library/view/~/9781788990615/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:23168982025-07-17T00:21:50Z2025-07-17T00:21:50Zby Harper, Allen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781260108422/?ar">https://learning.oreilly.com/library/view/~/9781260108422/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar">https://go.oreilly.com/library-access/library/view/-/9781260108422/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:23235892025-07-17T00:21:50Z2025-07-17T00:21:50Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582025-07-17T00:21:50Z2025-07-17T00:21:50Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modulesent://SD_ILS/0/SD_ILS:23118492025-07-17T00:21:50Z2025-07-17T00:21:50Zby Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a>
<a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distributionent://SD_ILS/0/SD_ILS:23080752025-07-17T00:21:50Z2025-07-17T00:21:50Zby Alamanni, Marco, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280856/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280856/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280856">https://learning.oreilly.com/library/view/~/9781785280856</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280856/?ar">https://learning.oreilly.com/library/view/~/9781785280856/?ar</a><br/>Format: Electronic Resources<br/>Kali LInux CTF blueprints : build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:23039982025-07-17T00:21:50Z2025-07-17T00:21:50Zby Buchanan, Cameron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar">https://go.oreilly.com/library-access/library/view/-/9781783985982/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783985982/?ar">https://learning.oreilly.com/library/view/~/9781783985982/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testingent://SD_ILS/0/SD_ILS:23198472025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789952308/?ar">https://learning.oreilly.com/library/view/~/9781789952308/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar">https://go.oreilly.com/library-access/library/view/-/9781789952308/?ar</a><br/>Format: Electronic Resources<br/>Testing practitioner handbook : gain insights into the latest technology and business trends within testing domainsent://SD_ILS/0/SD_ILS:23130292025-07-17T00:21:50Z2025-07-17T00:21:50Zby Rajani, Renu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299541/?ar">https://learning.oreilly.com/library/view/~/9781788299541/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299541/?ar</a><br/>Format: Electronic Resources<br/>Qi ye shen tou ce shi he chi xu jian kong.ent://SD_ILS/0/SD_ILS:23322892025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar">https://go.oreilly.com/library-access/library/view/-/8882021010402/?ar</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402">https://learning.oreilly.com/videos/~/8882021010402</a>
<a href="https://learning.oreilly.com/videos/~/8882021010402/?ar">https://learning.oreilly.com/videos/~/8882021010402/?ar</a><br/>Format: Video recording<br/>Hei ke wang luo ying yong : wang luo qin ru ying yong.ent://SD_ILS/0/SD_ILS:23322882025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, presenter.<br/><a href="https://learning.oreilly.com/videos/~/8882020122902">https://learning.oreilly.com/videos/~/8882020122902</a>
<a href="https://learning.oreilly.com/videos/~/8882020122902/?ar">https://learning.oreilly.com/videos/~/8882020122902/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar">https://go.oreilly.com/library-access/library/view/-/8882020122902/?ar</a><br/>Format: Video recording<br/>Certified ethical hacker (CEH) complete video courseent://SD_ILS/0/SD_ILS:23321462025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar">https://go.oreilly.com/library-access/library/view/-/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797/?ar">https://learning.oreilly.com/videos/~/9780137446797/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780137446797">https://learning.oreilly.com/videos/~/9780137446797</a><br/>Format: Video recording<br/>Managing information securityent://SD_ILS/0/SD_ILS:23005372025-07-17T00:21:50Z2025-07-17T00:21:50Zby Vacca, John R., editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166882/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166882/?ar">https://learning.oreilly.com/library/view/~/9780124166882/?ar</a><br/>Format: Electronic Resources<br/>CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)ent://SD_ILS/0/SD_ILS:23322852025-07-17T00:21:50Z2025-07-17T00:21:50Zby Linn, Heather, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781264274901">https://learning.oreilly.com/library/view/~/9781264274901</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264274901/?ar">https://go.oreilly.com/library-access/library/view/-/9781264274901/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781264274901/?ar">https://learning.oreilly.com/library/view/~/9781264274901/?ar</a><br/>Format: Electronic Resources<br/>Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administratorsent://SD_ILS/0/SD_ILS:23134952025-07-17T00:21:50Z2025-07-17T00:21:50Zby Calderon, Paulino, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786467454/?ar">https://go.oreilly.com/library-access/library/view/-/9781786467454/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786467454/?ar">https://learning.oreilly.com/library/view/~/9781786467454/?ar</a><br/>Format: Electronic Resources<br/>CEH v11 : certified ethical hacker version 11 practice testsent://SD_ILS/0/SD_ILS:23303852025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar">https://go.oreilly.com/library-access/library/view/-/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510/?ar">https://learning.oreilly.com/library/view/~/9781119824510/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119824510">https://learning.oreilly.com/library/view/~/9781119824510</a><br/>Format: Electronic Resources<br/>Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux toolsent://SD_ILS/0/SD_ILS:23153862025-07-17T00:21:50Z2025-07-17T00:21:50Zby Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environmentsent://SD_ILS/0/SD_ILS:23102572025-07-17T00:21:50Z2025-07-17T00:21:50Zby Allen, Lee (Information security specialist), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395810/?ar">https://learning.oreilly.com/library/view/~/9781784395810/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395810/?ar</a><br/>Format: Electronic Resources<br/>CompTIA PenTest+ study guide : exam PT0-002ent://SD_ILS/0/SD_ILS:23314472025-07-17T00:21:50Z2025-07-17T00:21:50Zby Chapple, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119823810">https://learning.oreilly.com/library/view/~/9781119823810</a>
<a href="https://learning.oreilly.com/library/view/~/9781119823810/?ar">https://learning.oreilly.com/library/view/~/9781119823810/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119823810/?ar">https://go.oreilly.com/library-access/library/view/-/9781119823810/?ar</a><br/>Format: Electronic Resources<br/>CompTIA PenTest+ PT0-002 Cert Guide, 2nd Editionent://SD_ILS/0/SD_ILS:23311112025-07-17T00:21:50Z2025-07-17T00:21:50Zby Santos, Omar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137566204">https://learning.oreilly.com/library/view/~/9780137566204</a>
<a href="https://learning.oreilly.com/library/view/~/9780137566204/?ar">https://learning.oreilly.com/library/view/~/9780137566204/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137566204/?ar">https://go.oreilly.com/library-access/library/view/-/9780137566204/?ar</a><br/>Format: Electronic Resources<br/>The car hacker's handbook : a guide for the penetration testerent://SD_ILS/0/SD_ILS:23100982025-07-17T00:21:50Z2025-07-17T00:21:50Zby Smith, Craig (Reverse engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457198847">https://learning.oreilly.com/library/view/~/9781457198847</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457198847/?ar">https://go.oreilly.com/library-access/library/view/-/9781457198847/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457198847/?ar">https://learning.oreilly.com/library/view/~/9781457198847/?ar</a><br/>Format: Electronic Resources<br/>CEH v9 certified ethical hacker version 9 practice testsent://SD_ILS/0/SD_ILS:23106692025-07-17T00:21:50Z2025-07-17T00:21:50Zby Blockmon, Raymond, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119252153/?ar">https://go.oreilly.com/library-access/library/view/-/9781119252153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119252153">https://learning.oreilly.com/library/view/~/9781119252153</a>
<a href="https://learning.oreilly.com/library/view/~/9781119252153/?ar">https://learning.oreilly.com/library/view/~/9781119252153/?ar</a><br/>Format: Electronic Resources<br/>Certified Ethical Hacker (CEH) Exam Crament://SD_ILS/0/SD_ILS:23308772025-07-17T00:21:50Z2025-07-17T00:21:50Zby Easttom, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137513697">https://learning.oreilly.com/library/view/~/9780137513697</a>
<a href="https://learning.oreilly.com/library/view/~/9780137513697/?ar">https://learning.oreilly.com/library/view/~/9780137513697/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137513697/?ar">https://go.oreilly.com/library-access/library/view/-/9780137513697/?ar</a><br/>Format: Electronic Resources<br/>CEH Certified Ethical Hacker All-In-One Exam Guide.ent://SD_ILS/0/SD_ILS:23308312025-07-17T00:21:50Z2025-07-17T00:21:50Zby Walker, Matt.<br/><a href="https://learning.oreilly.com/library/view/~/9781264269952">https://learning.oreilly.com/library/view/~/9781264269952</a>
<a href="https://learning.oreilly.com/library/view/~/9781264269952/?ar">https://learning.oreilly.com/library/view/~/9781264269952/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781264269952/?ar">https://go.oreilly.com/library-access/library/view/-/9781264269952/?ar</a><br/>Format: Electronic Resources<br/>Ethical hacking and CompTIA PenTest+ exam prep (PT0-001)ent://SD_ILS/0/SD_ILS:23193202025-07-17T00:21:50Z2025-07-17T00:21:50Zby Solomon, Michael (Michael G.), 1963- on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838640019/?ar">https://go.oreilly.com/library-access/library/view/-/9781838640019/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838640019/?ar">https://learning.oreilly.com/videos/~/9781838640019/?ar</a><br/>Format: Electronic Resources<br/>CISSP 8 domains.ent://SD_ILS/0/SD_ILS:23322542025-07-17T00:21:50Z2025-07-17T00:21:50Zby Bushmiller, Dean, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780996619141">https://learning.oreilly.com/videos/~/9780996619141</a>
<a href="https://learning.oreilly.com/videos/~/9780996619141/?ar">https://learning.oreilly.com/videos/~/9780996619141/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780996619141/?ar">https://go.oreilly.com/library-access/library/view/-/9780996619141/?ar</a><br/>Format: Video recording<br/>Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testingent://SD_ILS/0/SD_ILS:23299422025-07-17T00:21:50Z2025-07-17T00:21:50Zby Sheikh, Ahmed.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484272589/?ar">https://go.oreilly.com/library-access/library/view/-/9781484272589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272589/?ar">https://learning.oreilly.com/library/view/~/9781484272589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484272589">https://learning.oreilly.com/library/view/~/9781484272589</a><br/>Format: Electronic Resources<br/>CEH v11 certified ethical hacker study guideent://SD_ILS/0/SD_ILS:23297762025-07-17T00:21:50Z2025-07-17T00:21:50Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119800286/?ar">https://learning.oreilly.com/library/view/~/9781119800286/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar">https://go.oreilly.com/library-access/library/view/-/9781119800286/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119800286">https://learning.oreilly.com/library/view/~/9781119800286</a><br/>Format: Electronic Resources<br/>