Search Results for Hackers. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHackers.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300? 2024-11-14T14:49:12Z Berek &amp; Hacker's gynecologic oncology ent://SD_ILS/0/SD_ILS:321215 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Berek, Jonathan S.&#160;Hacker, Neville F.&#160;Hengst, Timothy C.&#160;Barile, George.&#160;Berek, Deborah.<br/>Preferred Shelf Number&#160;ONLINE(321215.1)<br/>Electronic Access&#160;<a href="http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=booktext&NEWS=N&DF=bookdb&AN=01412543/5th_Edition&XPATH=/PG(0)">Authentication may be required:</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Berek and Hacker's gynecologic oncology ent://SD_ILS/0/SD_ILS:321205 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Berek, Jonathan S.&#160;Hacker, Neville F.&#160;Ovid Technologies, Inc.<br/>Preferred Shelf Number&#160;ONLINE(321205.1)<br/>Electronic Access&#160;<a href="http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=booktext&NEWS=N&DF=bookdb&AN=01412543/5th_Edition&XPATH=/PG(0)">Authentication may be required:</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X for hackers at heart ent://SD_ILS/0/SD_ILS:253680 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Potter, Bruce.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490405">http://www.sciencedirect.com/science/book/9781597490405</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hackers &amp; painters : big ideas from the computer age ent://SD_ILS/0/SD_ILS:479752 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Graham, Paul, 1964-<br/>Preferred Shelf Number&#160;HD8039.D37 G73 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;O'Connor, T. J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense against the black arts how hackers do what they do and how to protect against it ent://SD_ILS/0/SD_ILS:291581 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Varsalone, Jesse.&#160;McFadden, Matthew.&#160;Morrissey, Sean.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:148006 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Bathurst, Robert.&#160;Rogers, Russ.&#160;Ghassemlouei, Alijohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Yeni ba&#351;layanlar i&ccedil;in bilgi g&uuml;venli&#287;i ve uygulamal&#305; hacking y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:423184 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Aslanbakan, Enes, yazar<br/>Preferred Shelf Number&#160;QA76.9.A25 A75 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &Ouml;zg&uuml;rl&uuml;&#287;&uuml;n alt&#305; derecesi ent://SD_ILS/0/SD_ILS:462106 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Dickner, Nicolas.&#160;Sezer, Soner.&#160;T&uuml;r, Zeynep.<br/>Preferred Shelf Number&#160;PQ3919.2.D5155 O94 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> S&#305;f&#305;r teorisi The zero theorem ent://SD_ILS/0/SD_ILS:387164 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Gilliam, Terry, y&ouml;netmen.&#160;Chartier, Nicolas, yap&#305;mc&#305;.&#160;Zanuck, Dean, yap&#305;mc&#305;.&#160;Waltz, Christoph, 1956- oyuncu.&#160;Damon, Matt, oyuncu.<br/>Preferred Shelf Number&#160;PN1995.9.S26 S545 2015<br/>Format:&#160;Visual Materials<br/>Availability&#160;Beytepe Library~1<br/> Dissecting the hack : the v3rb0ten network ent://SD_ILS/0/SD_ILS:458624 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Street, Jayson E., author.&#160;Sims, Kristin, author.&#160;Baskin, Brian, author.&#160;Martin, Brian, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacker Blackhat ent://SD_ILS/0/SD_ILS:379682 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Mann, Michael, 1943- film director, film producer.&#160;Foehl, Morgan Davis, screenwriter.&#160;Tull, Thomas, film producer.&#160;Hemsworth, Chris, actor.&#160;Davis, Viola, 1965- actor.<br/>Preferred Shelf Number&#160;PN1995.9.C66 H335 2015<br/>Electronic Access&#160;<a href="http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1">http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1</a> <a href="http://www.mrqe.com/movie_reviews/blackhat-m100112414">http://www.mrqe.com/movie_reviews/blackhat-m100112414</a><br/>Format:&#160;Visual Materials<br/>Availability&#160;Beytepe Library~1<br/> A&ccedil;&#305;k pencereler Open windows ent://SD_ILS/0/SD_ILS:386335 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Vigalondo, Nacho&#160;Atienza, Belen&#160;Wood, Elijah&#160;Grey, Sasha&#160;Maskell, Neil.<br/>Preferred Shelf Number&#160;PN1995.9.S87 A255 2014<br/>Format:&#160;Visual Materials<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Wikileaks:Be&#351;inci kuvvet Wikileaks: The Fifth Estate ent://SD_ILS/0/SD_ILS:319555 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Condon, Bill&#160;Singer, Josh&#160;Harding,Luke&#160;Leigh, David&#160;Katz, Virginia<br/>Preferred Shelf Number&#160;PN1995.9.B55 W555 2014<br/>Format:&#160;Visual Materials<br/>Availability&#160;Beytepe Library~2<br/> Hackerlar : bilgisayar devriminin kahramanlar&#305; ent://SD_ILS/0/SD_ILS:362909 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Levy, Steven&#160;Aslan, Emel.<br/>Preferred Shelf Number&#160;QA76.6 L489 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Misra, Anmol.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Pauli, Joshua J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alif the unseen ent://SD_ILS/0/SD_ILS:422722 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Wilson, G. Willow.<br/>Preferred Shelf Number&#160;PS3623.I5838 A78 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cybercrime and the law challenges, issues, and outcomes ent://SD_ILS/0/SD_ILS:241821 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Brenner, Susan W., 1947-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:147742 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding freedom : the ethics and aesthetics of hacking ent://SD_ILS/0/SD_ILS:376947 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Coleman, E. Gabriella, 1973-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt1r2gbj">http://www.jstor.org/stable/10.2307/j.ctt1r2gbj</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Hadnagy, Christopher.<br/>Preferred Shelf Number&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Preferred Shelf Number&#160;ONLINE(318966.1)<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:146413 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Dunham, Ken.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:146362 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Long, Johnny.&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:112200 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Long, Johnny.&#160;Russell, Ryan, 1969-&#160;Mullen, Timothy M.&#160;Pinzon, D. Scott.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:148551 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Long, Johnny.&#160;Russell, Ryan, 1969-&#160;Mullen, Timothy M.&#160;Pinzon, D. Scott.&#160;Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:146475 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Contos, Brian T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Joe Grand's &quot;best of&quot; hardware, wireless &amp; game console hacking includes DVD with 20 hacks in high-res color ent://SD_ILS/0/SD_ILS:147933 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Grand, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491136">http://www.sciencedirect.com/science/book/9781597491136</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:253681 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Bayles, Aaron W.&#160;Brindley, Ed.&#160;Foster, James C.&#160;Hurley, Chris.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The ethical hack a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:288310 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:253990 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;131ah.&#160;Russell, Ryan, 1969-&#160;Moss, Jeff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware hacking have fun while voiding your warranty ent://SD_ILS/0/SD_ILS:254027 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Grand, Joe.&#160;Russell, Ryan, 1969-&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266832">http://www.sciencedirect.com/science/book/9781932266832</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero day exploit countdown to darkness ent://SD_ILS/0/SD_ILS:253643 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;Shein, Rob.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:104130 2024-11-14T14:49:12Z 2024-11-14T14:49:12Z Author&#160;G&uuml;ven, Mehmet.<br/>Preferred Shelf Number&#160;QA 76.9.A25 G88 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/>