Search Results for Testing. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTesting.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2025-12-24T16:23:13Z
Testing code security
ent://SD_ILS/0/SD_ILS:546167
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Van der Linden, Maura A., author.<br/>Preferred Shelf Number QA76.9 .A25 V359 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:146805
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:112210
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Hurley, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and resilient software : requirements, test cases, and testing methods
ent://SD_ILS/0/SD_ILS:540156
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Preferred Shelf Number QA76.76 .T48 M47 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:145199
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research
ent://SD_ILS/0/SD_ILS:112179
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
ent://SD_ILS/0/SD_ILS:306469
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Maynor, David. Mookhey, K. K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research
ent://SD_ILS/0/SD_ILS:147051
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the CSSLP
ent://SD_ILS/0/SD_ILS:541754
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Paul, Mano., author.<br/>Preferred Shelf Number QA76.76 .D47 P3775 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security patch management
ent://SD_ILS/0/SD_ILS:542763
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Nicastro, Felicia M., author.<br/>Preferred Shelf Number QA76.9 .A25 N53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:545097
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Preferred Shelf Number QA76.76 .D47 M466 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Software deployment, updating, and patching
ent://SD_ILS/0/SD_ILS:544966
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Stackpole, Bill., author. Hanrion, Patrick.<br/>Preferred Shelf Number QA76.76 .C69 S74 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2025-12-24T16:23:13Z
2025-12-24T16:23:13Z
Author Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>