Search Results for HackersSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHackers$0026ic$003dtrue$0026ps$003d300?2026-02-21T21:56:33ZLittle hackersent://SD_ILS/0/SD_ILS:5639222026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Darling, Julie, author. Cools, Darren, illustrator.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501527">https://www.taylorfrancis.com/books/9781003501527</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Berek & Hacker's gynecologic oncologyent://SD_ILS/0/SD_ILS:3212152026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Berek, Jonathan S. Hacker, Neville F. Hengst, Timothy C. Barile, George. Berek, Deborah.<br/>Preferred Shelf Number ONLINE(321215.1)<br/>Electronic Access <a href="http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=booktext&NEWS=N&DF=bookdb&AN=01412543/5th_Edition&XPATH=/PG(0)">Authentication may be required:</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Berek and Hacker's gynecologic oncologyent://SD_ILS/0/SD_ILS:3212052026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Berek, Jonathan S. Hacker, Neville F. Ovid Technologies, Inc.<br/>Preferred Shelf Number ONLINE(321205.1)<br/>Electronic Access <a href="http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=booktext&NEWS=N&DF=bookdb&AN=01412543/5th_Edition&XPATH=/PG(0)">Authentication may be required:</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>OS X for hackers at heartent://SD_ILS/0/SD_ILS:2536802026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Potter, Bruce.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490405">http://www.sciencedirect.com/science/book/9781597490405</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hackers & painters : big ideas from the computer ageent://SD_ILS/0/SD_ILS:4797522026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Graham, Paul, 1964-<br/>Preferred Shelf Number HD8039.D37 G73 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>GUARDIANS OF THE DIGITAL AGE a time-traveling hacker's journey to protecting kids online.ent://SD_ILS/0/SD_ILS:5658442026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Biren, Elcin.<br/>Preferred Shelf Number PR9160.9 .B57<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501626">https://www.taylorfrancis.com/books/9781003501626</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The hack is back : techniques to beat hackers at their own gamesent://SD_ILS/0/SD_ILS:5584962026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Varsalone, Jesse, author. Haller, Christopher, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003033301">https://www.taylorfrancis.com/books/9781003033301</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniquesent://SD_ILS/0/SD_ILS:5957832026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Troia, Vinny, author.<br/>Preferred Shelf Number HV8079 .C65 T76 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:5954182026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.ent://SD_ILS/0/SD_ILS:5427572026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor VARSALONE, JESSE.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:5459732026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Chiesa, Raoul, 1973, author. Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number HV6773 .C477 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>6G-enabled technologies for next generation : fundamentals, applications, analysis and challengesent://SD_ILS/0/SD_ILS:5996662026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Tyagi, Amit Kumar, 1988- author. Tiwari, Shrikant, author. Gupta, Shivani (Professor), author. Mishra, Anand Kumar (Professor), author.<br/>Preferred Shelf Number TK5103.252 .T93 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394258369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394258369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Taming the hacking storm : a framework for securing and defending networksent://SD_ILS/0/SD_ILS:5998582026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5243082026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer securityent://SD_ILS/0/SD_ILS:5970852026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number QA76.9 .A25 R438 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer science security : concepts and toolsent://SD_ILS/0/SD_ILS:5977392026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Corporate cybersecurity : identifying risks and the bug bounty programent://SD_ILS/0/SD_ILS:5967852026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number HD30.38 .J34 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking multifactor authenticationent://SD_ILS/0/SD_ILS:5963262026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hands on hackingent://SD_ILS/0/SD_ILS:5963162026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Yeni başlayanlar için bilgi güvenliği ve uygulamalı hacking yöntemlerient://SD_ILS/0/SD_ILS:4231842026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Aslanbakan, Enes, yazar<br/>Preferred Shelf Number QA76.9.A25 A75 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>CEH v10 : certified ethical hacker study guideent://SD_ILS/0/SD_ILS:5953302026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CompTIA PenTest+ Study Guide : Exam PT0-001ent://SD_ILS/0/SD_ILS:5948662026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Chapple, Mike, author. Seidl, David, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549420">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549420</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:5949672026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor McDonough, Bart R., author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Özgürlüğün altı derecesient://SD_ILS/0/SD_ILS:4621062026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Dickner, Nicolas. Sezer, Soner. Tür, Zeynep.<br/>Preferred Shelf Number PQ3919.2.D5155 O94 2018<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:5944552026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social engineering : the science of human hackingent://SD_ILS/0/SD_ILS:5946352026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Hadnagy, Christopher, author.<br/>Preferred Shelf Number HM668 .H33 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Dissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacker Blackhatent://SD_ILS/0/SD_ILS:3796822026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Mann, Michael, 1943- film director, film producer. Foehl, Morgan Davis, screenwriter. Tull, Thomas, film producer. Hemsworth, Chris, actor. Davis, Viola, 1965- actor.<br/>Preferred Shelf Number PN1995.9.C66 H335 2015<br/>Electronic Access <a href="http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1">http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1</a>
<a href="http://www.mrqe.com/movie_reviews/blackhat-m100112414">http://www.mrqe.com/movie_reviews/blackhat-m100112414</a><br/>Format: Visual Materials<br/>Availability Beytepe Library~1<br/>Informatics and Communication Technologies for Societal Development Proceedings of ICICTS 2014ent://SD_ILS/0/SD_ILS:5300802026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Rajsingh, Elijah Blessing. editor. Bhojan, Anand. editor. Peter, J. Dinesh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-81-322-1916-3">https://doi.org/10.1007/978-81-322-1916-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:5445232026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Moore, Robert, 1976-, author.<br/>Preferred Shelf Number HV8079 .C65 M66 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315721767">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Sıfır teorisi The zero theorement://SD_ILS/0/SD_ILS:3871642026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Gilliam, Terry, yönetmen. Chartier, Nicolas, yapımcı. Zanuck, Dean, yapımcı. Waltz, Christoph, 1956- oyuncu. Damon, Matt, oyuncu.<br/>Preferred Shelf Number PN1995.9.S26 S545 2015<br/>Format: Visual Materials<br/>Availability Beytepe Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Wikileaks:Beşinci kuvvet Wikileaks: The Fifth Estateent://SD_ILS/0/SD_ILS:3195552026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Condon, Bill Singer, Josh Harding,Luke Leigh, David Katz, Virginia<br/>Preferred Shelf Number PN1995.9.B55 W555 2014<br/>Format: Visual Materials<br/>Availability Beytepe Library~2<br/>Hackerlar : bilgisayar devriminin kahramanlarıent://SD_ILS/0/SD_ILS:3629092026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Levy, Steven Aslan, Emel.<br/>Preferred Shelf Number QA76.6 L489 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Açık pencereler Open windowsent://SD_ILS/0/SD_ILS:3863352026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Vigalondo, Nacho Atienza, Belen Wood, Elijah Grey, Sasha Maskell, Neil.<br/>Preferred Shelf Number PN1995.9.S87 A255 2014<br/>Format: Visual Materials<br/>Availability Beytepe Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Alif the unseenent://SD_ILS/0/SD_ILS:4227222026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Wilson, G. Willow.<br/>Preferred Shelf Number PS3623.I5838 A78 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:5468032026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Misra, Anmol., author.<br/>Preferred Shelf Number QA76.774 .A53 M57 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439896471">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Femtocells : secure communication and networkingent://SD_ILS/0/SD_ILS:5478642026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Wong, Marcus, author.<br/>Preferred Shelf Number TK5105.75 .W664 2013 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003338178">https://www.taylorfrancis.com/books/9781003338178</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and the law challenges, issues, and outcomesent://SD_ILS/0/SD_ILS:2418212026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Brenner, Susan W., 1947- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1477422026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Coding freedom : the ethics and aesthetics of hackingent://SD_ILS/0/SD_ILS:3769472026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Coleman, E. Gabriella, 1973-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1r2gbj">http://www.jstor.org/stable/10.2307/j.ctt1r2gbj</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Windows Windows security secrets & solutionsent://SD_ILS/0/SD_ILS:2933412026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Scambray, Joel. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Web 2.0 Web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2933522026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed web applications web application security secrets and solutionsent://SD_ILS/0/SD_ILS:2932772026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed malware & rootkits malware & rootkits security secrets & solutionsent://SD_ILS/0/SD_ILS:2933972026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:3189662026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Howard, Doug. Prince, Kevin.<br/>Preferred Shelf Number ONLINE(318966.1)<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social engineering : the art of human hackingent://SD_ILS/0/SD_ILS:3779762026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Honeypot : a new paradigm to information securityent://SD_ILS/0/SD_ILS:5455902026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1451992026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>No tech hacking a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:1463622026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Long, Johnny. Mitnick, Kevin D. (Kevin David), 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Contos, Brian T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Joe Grand's "best of" hardware, wireless & game console hacking includes DVD with 20 hacks in high-res colorent://SD_ILS/0/SD_ILS:1479332026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Grand, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491136">http://www.sciencedirect.com/science/book/9781597491136</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:2536812026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The ethical hack : a framework for business value penetration testingent://SD_ILS/0/SD_ILS:5462622026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Tiller, James S., author.<br/>Preferred Shelf Number TK5105.59 .T55 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135502485">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware hacking have fun while voiding your warrantyent://SD_ILS/0/SD_ILS:2540272026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Grand, Joe. Russell, Ryan, 1969- Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266832">http://www.sciencedirect.com/science/book/9781932266832</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zero day exploit countdown to darknessent://SD_ILS/0/SD_ILS:2536432026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Shein, Rob. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Information security management handbookent://SD_ILS/0/SD_ILS:5393272026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Krause, Micki. Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135492335">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>The privacy papers : managing technology, consumer, employee, and legislative actionent://SD_ILS/0/SD_ILS:5399542026-02-21T21:56:33Z2026-02-21T21:56:33ZAuthor Herold, Rebecca.<br/>Preferred Shelf Number KF1262 .P754 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420000177">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>