Search Results for -- UYGARLIK, ORTA&Ccedil;A&#286;, EDEB&#304;YATTA. - Narrowed by: Online Library - Computer security. - Operating systems (Computers) -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bUYGARLIK$00252C$002bORTA$0025C3$002587A$0025C4$00259E$00252C$002bEDEB$0025C4$0025B0YATTA.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Operating$002bsystems$002b$002528Computers$002529$002b--$002bSecurity$002bmeasures.$002509Operating$002bsystems$002b$002528Computers$002529$002b--$002bSecurity$002bmeasures.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T17:18:57Z The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:148006 2024-09-10T17:18:57Z 2024-09-10T17:18:57Z Author&#160;Bathurst, Robert.&#160;Rogers, Russ.&#160;Ghassemlouei, Alijohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A guide to kernel exploitation attacking the core ent://SD_ILS/0/SD_ILS:148059 2024-09-10T17:18:57Z 2024-09-10T17:18:57Z Author&#160;Perla, Enrico.&#160;Massimiliano, Oldani.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>