Search Results for Computer networks. - Narrowed by: Computer hackers. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bhackers.$002509Computer$002bhackers.$0026ps$003d300$0026isd$003dtrue? 2024-11-14T06:29:32Z Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Pauli, Joshua J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense against the black arts how hackers do what they do and how to protect against it ent://SD_ILS/0/SD_ILS:291581 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Varsalone, Jesse.&#160;McFadden, Matthew.&#160;Morrissey, Sean.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:146475 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Contos, Brian T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The ethical hack a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:288310 2024-11-14T06:29:32Z 2024-11-14T06:29:32Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>