Search Results for Electronic books. - Narrowed by: Sécurité informatique. - Tests d'intrusion.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Konu$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Konu$002509Tests$002bd$002527intrusion.$002509Tests$002bd$002527intrusion.$0026te$003dILS$0026ps$003d300?
2024-06-23T20:39:34Z
Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen
ent://SD_ILS/0/SD_ILS:2321348
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Elektronik Kaynak<br/>
Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheit
ent://SD_ILS/0/SD_ILS:2316255
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format: Elektronik Kaynak<br/>
Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.
ent://SD_ILS/0/SD_ILS:2315320
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Elektronik Kaynak<br/>
The complete Metasploit guide : explore effective penetration testing techniques with Metasploit
ent://SD_ILS/0/SD_ILS:2327077
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Elektronik Kaynak<br/>
Metasploit for beginners : create a threat-free environment with the best-in-class tool
ent://SD_ILS/0/SD_ILS:2313840
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Elektronik Kaynak<br/>
CEH Certified Ethical Hacker Cert guide
ent://SD_ILS/0/SD_ILS:2331621
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Elektronik Kaynak<br/>
Network scanning cookbook : practical network security using Nmap and Nessus 7
ent://SD_ILS/0/SD_ILS:2317776
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Elektronik Kaynak<br/>
Becoming the hacker : the playbook for getting inside the mind of an attacker
ent://SD_ILS/0/SD_ILS:2319129
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Elektronik Kaynak<br/>
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
ent://SD_ILS/0/SD_ILS:2313499
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Elektronik Kaynak<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:2325452
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Hickey, Matthew (Computer security expert), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar">https://go.oreilly.com/library-access/library/view/-/9781119561453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453">https://learning.oreilly.com/library/view/~/9781119561453</a>
<a href="https://learning.oreilly.com/library/view/~/9781119561453/?ar">https://learning.oreilly.com/library/view/~/9781119561453/?ar</a><br/>Format: Elektronik Kaynak<br/>
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
ent://SD_ILS/0/SD_ILS:2314683
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Elektronik Kaynak<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:2323589
2024-06-23T20:39:34Z
2024-06-23T20:39:34Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Elektronik Kaynak<br/>