Search Results for Hacking - Narrowed by: Wiley E-Book Collection SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHacking$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ps$003d300?dt=list 2026-04-04T21:54:14Z Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H53 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Hadnagy, Christopher, author.<br/>Preferred Shelf Number&#160;HM668 .H33 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Taming the hacking storm : a framework for securing and defending networks ent://SD_ILS/0/SD_ILS:599858 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:593439 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Allsopp, Wil, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI and electoral campaigns ent://SD_ILS/0/SD_ILS:600175 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Rubio N&uacute;&ntilde;ez, Rafael, author.&#160;Alvim, Frederico Franco, author.&#160;Monteiro, Vitor, author.<br/>Preferred Shelf Number&#160;JF1001<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394311811">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394311811</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI security : defense, threats, and vulnerabilities ent://SD_ILS/0/SD_ILS:600294 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Rana, Shaila, author.&#160;Chicone, Rhonda, author.<br/>Preferred Shelf Number&#160;Q335 .R36 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A companion to digital ethics ent://SD_ILS/0/SD_ILS:600059 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Floridi, Luciano, 1964- editor.&#160;Taddeo, Mariarosaria, editor.<br/>Preferred Shelf Number&#160;BJ59 .C598 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394240821">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394240821</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainably investing in digital assets globally ent://SD_ILS/0/SD_ILS:597764 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Ozelli, Selva, author.<br/>Preferred Shelf Number&#160;HG4515.15 .O38 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Corporate cybersecurity : identifying risks and the bug bounty program ent://SD_ILS/0/SD_ILS:596785 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number&#160;HD30.38 .J34 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building secure cars : assuring the automotive software development lifecycle ent://SD_ILS/0/SD_ILS:596310 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Oka, Dennis Kengo, author.<br/>Preferred Shelf Number&#160;TL272.53 .O42 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The pentester blueprint : starting a career as an ethical hacker ent://SD_ILS/0/SD_ILS:596380 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Wylie, Phillip L., author.&#160;Crawley, Kim.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques ent://SD_ILS/0/SD_ILS:595783 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Troia, Vinny, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 T76 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime investigators handbook ent://SD_ILS/0/SD_ILS:595400 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Edwards, Graeme (Financial and cybercrime investigator), author.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C368 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S36 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CEH v10 : certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:595330 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The image-interface : graphical supports for visual information ent://SD_ILS/0/SD_ILS:594070 2026-04-04T21:54:14Z 2026-04-04T21:54:14Z Author&#160;Reyes-Garcia, Everardo, author.<br/>Preferred Shelf Number&#160;QA76.9 .U83<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119474166">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119474166</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>