Search Results for Hacking SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHacking$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-23T07:34:36Z Hacking Interface ent://SD_ILS/0/SD_ILS:524308 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2024<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Hacking healthcare ent://SD_ILS/0/SD_ILS:280330 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Trotter, Fred.&#160;Uhlman, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=495835">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=495835</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:147861 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Haines, Brad.&#160;Schearer, Michael J.&#160;Thornton, Frank (Thorn)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asterisk hacking ent://SD_ILS/0/SD_ILS:145355 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Brashars, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the Kinect ent://SD_ILS/0/SD_ILS:171637 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Kramer, Jeff. author.&#160;Burrus, Nicolas. author.&#160;Echtler, Florian. author.&#160;Daniel, Herrera C. author.&#160;Parker, Matt. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-3868-3">http://dx.doi.org/10.1007/978-1-4302-3868-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Ethical hacking : offensive &amp; defensive ent://SD_ILS/0/SD_ILS:513450 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;&Ccedil;&#305;tak, &Ouml;mer.<br/>Preferred Shelf Number&#160;QA76.9.A25 C58 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:356364 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Baloch, Rafay, author.<br/>Preferred Shelf Number&#160;ONLINE(356364.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482231625">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Linksys WRT54G ultimate hacking ent://SD_ILS/0/SD_ILS:147871 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Asadoorian, Paul.&#160;Pesce, Larry.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491662">http://www.sciencedirect.com/science/book/9781597491662</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Linksys WRT54G ultimate hacking ent://SD_ILS/0/SD_ILS:112178 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Asadoorian, Paul.&#160;Pesce, Larry.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491662">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical hacking techniques and countermeasures ent://SD_ILS/0/SD_ILS:288426 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Spivey, Mark D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013382">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:253997 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Long, Johnny.&#160;Skoudis, Ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836364">http://www.sciencedirect.com/science/book/9781931836364</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Y&#305;lmaz, Davut.<br/>Preferred Shelf Number&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking Europe From Computer Cultures to Demoscenes ent://SD_ILS/0/SD_ILS:484344 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Alberts, Gerard. editor.&#160;Oldenziel, Ruth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-5493-8">https://doi.org/10.1007/978-1-4471-5493-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Preferred Shelf Number&#160;TK5105.59 M48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hadnagy, Christopher.<br/>Preferred Shelf Number&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless hacking projects for Wi-Fi enthusiasts ent://SD_ILS/0/SD_ILS:253648 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Barken, Lee.&#160;Bermel, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836371">http://www.sciencedirect.com/science/book/9781931836371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Yeni ba&#351;layanlar i&ccedil;in bilgi g&uuml;venli&#287;i ve uygulamal&#305; hacking y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:423184 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Aslanbakan, Enes, yazar<br/>Preferred Shelf Number&#160;QA76.9.A25 A75 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Joe Grand's &quot;best of&quot; hardware, wireless &amp; game console hacking includes DVD with 20 hacks in high-res color ent://SD_ILS/0/SD_ILS:147933 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Grand, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491136">http://www.sciencedirect.com/science/book/9781597491136</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructing an ethical hacking knowledge base for threat awareness and prevention ent://SD_ILS/0/SD_ILS:482044 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Dhavale, Sunita Vikrant, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, India ent://SD_ILS/0/SD_ILS:486482 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Chakraborty, Mohuya. editor.&#160;Chakrabarti, Satyajit. editor.&#160;Balas, Valentina Emilia. editor.&#160;Mandal, J. K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1544-2">https://doi.org/10.1007/978-981-13-1544-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking Health How to Make Money and Save Lives in the HealthTech World ent://SD_ILS/0/SD_ILS:402126 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Putrino, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71619-0">https://doi.org/10.1007/978-3-319-71619-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking wireless access points : cracking, tracking, and signal jacking ent://SD_ILS/0/SD_ILS:459299 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Kurtz, Jennifer Ann, author.&#160;Kaczmarek, Richard.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128053157">http://www.sciencedirect.com/science/book/9780128053157</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking and penetration testing with low power devices ent://SD_ILS/0/SD_ILS:355544 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Polstra, Philip, author.&#160;Ramachandran, Vivek, editor.<br/>Preferred Shelf Number&#160;ONLINE(355544.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007518">http://www.sciencedirect.com/science/book/9780128007518</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the academy new approaches to scholarship and teaching from digital humanities ent://SD_ILS/0/SD_ILS:240706 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Scheinfeldt, Tom.&#160;Cohen, Daniel J. (Daniel Jared), 1968-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780472029471/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Pauli, Joshua J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:147742 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:148161 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking f&uuml;r Manager IT-Sicherheit f&uuml;r alle, die wenig Ahnung von Computern haben. ent://SD_ILS/0/SD_ILS:201076 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Schr&ouml;del, Tobias. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8349-7128-9">http://dx.doi.org/10.1007/978-3-8349-7128-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding freedom : the ethics and aesthetics of hacking ent://SD_ILS/0/SD_ILS:376947 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Coleman, E. Gabriella, 1973-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt1r2gbj">http://www.jstor.org/stable/10.2307/j.ctt1r2gbj</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ninja hacking unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:146263 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Wilhelm, Thomas.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking f&uuml;r Manager Was Manager &uuml;ber IT-Sicherheit wissen m&uuml;ssen. Die Tricks der Hacker. ent://SD_ILS/0/SD_ILS:200624 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Schr&ouml;del, Tobias. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8349-6475-5">http://dx.doi.org/10.1007/978-3-8349-6475-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Professional penetration testing creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:147348 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Wilhelm, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494250">http://www.sciencedirect.com/science/book/9781597494250</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:146362 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Long, Johnny.&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:148388 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Kleiman, Dave.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:112206 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Kleiman, Dave.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:253681 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Bayles, Aaron W.&#160;Brindley, Ed.&#160;Foster, James C.&#160;Hurley, Chris.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking a terror network the silent threat of covert channels ent://SD_ILS/0/SD_ILS:253987 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game console hacking have fun while voiding you warranty ent://SD_ILS/0/SD_ILS:253996 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Grand, Joe.&#160;Thornton, Frank.&#160;Yarusso, Albert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836319">http://www.sciencedirect.com/science/book/9781931836319</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the code ASP.NET web application security ent://SD_ILS/0/SD_ILS:254022 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Burnett, Mark M.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware hacking have fun while voiding your warranty ent://SD_ILS/0/SD_ILS:254027 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Grand, Joe.&#160;Russell, Ryan, 1969-&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266832">http://www.sciencedirect.com/science/book/9781932266832</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foto&#287;raf&#305;n t&uuml;m &ouml;yk&uuml;s&uuml; ent://SD_ILS/0/SD_ILS:366680 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Juliet.&#160;Campany, David.&#160;Bozkurt, Abbas.<br/>Preferred Shelf Number&#160;TR15 F68 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Photography : the whole story ent://SD_ILS/0/SD_ILS:267558 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Juliet.<br/>Preferred Shelf Number&#160;REF TR15 P493 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Lives of the great photographers ent://SD_ILS/0/SD_ILS:373834 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Juliet.<br/>Preferred Shelf Number&#160;TR139 H25 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Olas&#305;l&#305;k ve t&uuml;mevar&#305;m mant&#305;&#287;&#305;na giri&#351; ent://SD_ILS/0/SD_ILS:370908 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Ian.&#160;&Ouml;zdabak, &#304;rfan.<br/>Preferred Shelf Number&#160;BC141 H33 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> An introduction to probability and inductive logic ent://SD_ILS/0/SD_ILS:81720 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Ian.<br/>Preferred Shelf Number&#160;BC 141 H33 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Why does language matter to philosophy? ent://SD_ILS/0/SD_ILS:19861 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Ian.<br/>Preferred Shelf Number&#160;P 106 H284 1975<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Why is there philosophy of mathematics at all? ent://SD_ILS/0/SD_ILS:364396 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Hacking, Ian, author.<br/>Preferred Shelf Number&#160;QA8.4 H29 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Radiological Interventions in Obstetrics and Gynaecology ent://SD_ILS/0/SD_ILS:487213 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Reidy, John. editor.&#160;Hacking, Nigel. editor.&#160;McLucas, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27975-1">https://doi.org/10.1007/978-3-642-27975-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity ent://SD_ILS/0/SD_ILS:520179 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520179.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520598 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Furnell, Steven. editor.&#160;Clarke, Nathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520598.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-38530-8">https://doi.org/10.1007/978-3-031-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human-Computer Interaction - INTERACT 2023 19th IFIP TC13 International Conference, York, UK, August 28 - September 1, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:520973 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Abdelnour Nocera, Jos&eacute;. editor.&#160;Krist&iacute;n L&aacute;rusd&oacute;ttir, Marta. editor.&#160;Petrie, Helen. editor.&#160;Piccinno, Antonio. editor.&#160;Winckler, Marco. editor.<br/>Preferred Shelf Number&#160;XX(520973.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42293-5">https://doi.org/10.1007/978-3-031-42293-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521378 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Fu, Jie. editor.&#160;Kroupa, Tomas. editor.&#160;Hayel, Yezekael. editor. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521378.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50670-3">https://doi.org/10.1007/978-3-031-50670-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Health Entrepreneurship ent://SD_ILS/0/SD_ILS:521880 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Meyers, Arlen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521880.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33902-8">https://doi.org/10.1007/978-3-031-33902-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-Humans Our Future with Machines ent://SD_ILS/0/SD_ILS:518567 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Barfield, Woodrow. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518567.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-25050-2">https://doi.org/10.1007/978-3-319-25050-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Misra, Anmol.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The definitive guide to complying with the HIPAA/HITECH privacy and security rules ent://SD_ILS/0/SD_ILS:287167 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Trinckes, John J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466507685">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows networking tools the complete guide to management, troubleshooting, and security ent://SD_ILS/0/SD_ILS:291657 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Held, Gilbert, 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466511071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense against the black arts how hackers do what they do and how to protect against it ent://SD_ILS/0/SD_ILS:291581 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Varsalone, Jesse.&#160;McFadden, Matthew.&#160;Morrissey, Sean.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Criminology : a reader ent://SD_ILS/0/SD_ILS:90691 2024-12-23T07:34:36Z 2024-12-23T07:34:36Z Author&#160;Jewkes, Yvonne, 1966- ed.&#160;Letherby, Gayle, ed.<br/>Preferred Shelf Number&#160;HV 6025 C7455 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>