Search Results for Computer hackers.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bhackers.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-24T12:08:19ZHardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hackers & painters : big ideas from the computer ageent://SD_ILS/0/SD_ILS:4797522024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Graham, Paul, 1964-<br/>Preferred Shelf Number HD8039.D37 G73 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:4231842024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Aslanbakan, Enes, yazar<br/>Preferred Shelf Number QA76.9.A25 A75 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1477422024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and the law challenges, issues, and outcomesent://SD_ILS/0/SD_ILS:2418212024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Brenner, Susan W., 1947- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against the black arts how hackers do what they do and how to protect against itent://SD_ILS/0/SD_ILS:2915812024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Coding freedom : the ethics and aesthetics of hackingent://SD_ILS/0/SD_ILS:3769472024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Coleman, E. Gabriella, 1973-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1r2gbj">http://www.jstor.org/stable/10.2307/j.ctt1r2gbj</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Windows Windows security secrets & solutionsent://SD_ILS/0/SD_ILS:2933412024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Scambray, Joel. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Web 2.0 Web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2933522024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed malware & rootkits malware & rootkits security secrets & solutionsent://SD_ILS/0/SD_ILS:2933972024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Honeypot a new paradigm to information securityent://SD_ILS/0/SD_ILS:2889612024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Joshi, R. C. Sardana, Anjali.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Hacking exposed web applications web application security secrets and solutionsent://SD_ILS/0/SD_ILS:2932772024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1451992024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Profiling hackers the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:2914122024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>No tech hacking a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:1463622024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Long, Johnny. Mitnick, Kevin D. (Kevin David), 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Contos, Brian T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Joe Grand's "best of" hardware, wireless & game console hacking includes DVD with 20 hacks in high-res colorent://SD_ILS/0/SD_ILS:1479332024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Grand, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491136">http://www.sciencedirect.com/science/book/9781597491136</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:2536812024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Hardware hacking have fun while voiding your warrantyent://SD_ILS/0/SD_ILS:2540272024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Grand, Joe. Russell, Ryan, 1969- Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266832">http://www.sciencedirect.com/science/book/9781932266832</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zero day exploit countdown to darknessent://SD_ILS/0/SD_ILS:2536432024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor Shein, Rob. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902024-11-24T12:08:19Z2024-11-24T12:08:19ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>