Search Results for Electronic books. - Narrowed by: Hackers. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Konu$002509Hackers.$002509Hackers.$0026qf$003dSUBJECT$002509Konu$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026te$003dILS$0026ps$003d300?
2024-09-25T06:26:43Z
Hackers Beware
ent://SD_ILS/0/SD_ILS:2319757
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/0735710090">https://learning.oreilly.com/library/view/~/0735710090</a>
<a href="https://learning.oreilly.com/library/view/~/0735710090/?ar">https://learning.oreilly.com/library/view/~/0735710090/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735710090/?ar">https://go.oreilly.com/library-access/library/view/-/0735710090/?ar</a><br/>Format: Elektronik Kaynak<br/>
Dear Hacker : letters to the editor of 2600
ent://SD_ILS/0/SD_ILS:2289468
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Elektronik Kaynak<br/>
Threat hunting : a guide to proactive network defense
ent://SD_ILS/0/SD_ILS:2318444
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
ent://SD_ILS/0/SD_ILS:2325946
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Elektronik Kaynak<br/>
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
ent://SD_ILS/0/SD_ILS:2285143
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
ent://SD_ILS/0/SD_ILS:2331683
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Elektronik Kaynak<br/>
Chained exploits : advanced hacking attacks from start to finish
ent://SD_ILS/0/SD_ILS:2286103
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Elektronik Kaynak<br/>
Ninja hacking : unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:2290304
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Elektronik Kaynak<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2290821
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Harper, Allen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742559/?ar">https://learning.oreilly.com/library/view/~/9780071742559/?ar</a><br/>Format: Elektronik Kaynak<br/>
Honeypots : tracking hackers
ent://SD_ILS/0/SD_ILS:2280821
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format: Elektronik Kaynak<br/>
Dissecting the hack : the V3rb0ten network
ent://SD_ILS/0/SD_ILS:2309296
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Elektronik Kaynak<br/>
Preventing good people from doing bad things : implementing least privilege
ent://SD_ILS/0/SD_ILS:2293278
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Elektronik Kaynak<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking point of sale : payment application secrets, threats, and solutions
ent://SD_ILS/0/SD_ILS:2302623
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Elektronik Kaynak<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:2306510
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Regalado, Daniel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071832380/?ar">https://learning.oreilly.com/library/view/~/9780071832380/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar">https://go.oreilly.com/library-access/library/view/-/9780071832380/?ar</a><br/>Format: Elektronik Kaynak<br/>
Dissecting the hack : the f0rb1dd3n network
ent://SD_ILS/0/SD_ILS:2290700
2024-09-25T06:26:43Z
2024-09-25T06:26:43Z
by Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Elektronik Kaynak<br/>