Search Results for Hacking - Narrowed by: Wiley E-Book Collection
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHacking$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ps$003d300?dt=list
2026-04-04T21:54:14Z
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social engineering : the science of human hacking
ent://SD_ILS/0/SD_ILS:594635
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Hadnagy, Christopher, author.<br/>Preferred Shelf Number HM668 .H33 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Taming the hacking storm : a framework for securing and defending networks
ent://SD_ILS/0/SD_ILS:599858
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Allsopp, Wil, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI and electoral campaigns
ent://SD_ILS/0/SD_ILS:600175
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Rubio Núñez, Rafael, author. Alvim, Frederico Franco, author. Monteiro, Vitor, author.<br/>Preferred Shelf Number JF1001<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394311811">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394311811</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI security : defense, threats, and vulnerabilities
ent://SD_ILS/0/SD_ILS:600294
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Rana, Shaila, author. Chicone, Rhonda, author.<br/>Preferred Shelf Number Q335 .R36 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A companion to digital ethics
ent://SD_ILS/0/SD_ILS:600059
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Floridi, Luciano, 1964- editor. Taddeo, Mariarosaria, editor.<br/>Preferred Shelf Number BJ59 .C598 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394240821">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394240821</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sustainably investing in digital assets globally
ent://SD_ILS/0/SD_ILS:597764
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Ozelli, Selva, author.<br/>Preferred Shelf Number HG4515.15 .O38 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Corporate cybersecurity : identifying risks and the bug bounty program
ent://SD_ILS/0/SD_ILS:596785
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number HD30.38 .J34 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building secure cars : assuring the automotive software development lifecycle
ent://SD_ILS/0/SD_ILS:596310
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Oka, Dennis Kengo, author.<br/>Preferred Shelf Number TL272.53 .O42 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The pentester blueprint : starting a career as an ethical hacker
ent://SD_ILS/0/SD_ILS:596380
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Wylie, Phillip L., author. Crawley, Kim.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:596276
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques
ent://SD_ILS/0/SD_ILS:595783
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Troia, Vinny, author.<br/>Preferred Shelf Number HV8079 .C65 T76 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime investigators handbook
ent://SD_ILS/0/SD_ILS:595400
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Edwards, Graeme (Financial and cybercrime investigator), author.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number QA76.585 .S43 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CEH v10 : certified ethical hacker study guide
ent://SD_ILS/0/SD_ILS:595330
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Messier, Ric, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The image-interface : graphical supports for visual information
ent://SD_ILS/0/SD_ILS:594070
2026-04-04T21:54:14Z
2026-04-04T21:54:14Z
Author Reyes-Garcia, Everardo, author.<br/>Preferred Shelf Number QA76.9 .U83<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119474166">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119474166</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>