Search Results for Penetration testing (Computer security) - Narrowed by: HackingSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Subject$002509Hacking$002509Hacking$0026ps$003d300$0026isd$003dtrue?2026-03-07T11:45:40ZThe pentester blueprint : starting a career as an ethical hackerent://SD_ILS/0/SD_ILS:5963802026-03-07T11:45:40Z2026-03-07T11:45:40ZAuthor Wylie, Phillip L., author. Crawley, Kim.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hands on hackingent://SD_ILS/0/SD_ILS:5963162026-03-07T11:45:40Z2026-03-07T11:45:40ZAuthor Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-03-07T11:45:40Z2026-03-07T11:45:40ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>