Arama Sonuçları Security Measures - Daraltılmış: Computer hackers.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dSUBJECT$002509Konu$002509Computer$002bhackers.$002509Computer$002bhackers.$0026te$003dILS$0026ps$003d300?dt=list2024-12-26T14:27:00ZHacking Interfaceent://SD_ILS/0/SD_ILS:5243082024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2024<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA 76.9 A25 E43 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Pauli, Joshua J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Defense against the black arts how hackers do what they do and how to protect against itent://SD_ILS/0/SD_ILS:2915812024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Honeypot a new paradigm to information securityent://SD_ILS/0/SD_ILS:2889612024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Joshi, R. C. Sardana, Anjali.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed malware & rootkits malware & rootkits security secrets & solutionsent://SD_ILS/0/SD_ILS:2933972024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:2714382024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Yer Numarası TK5105.59 O786 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking exposed web applications web application security secrets and solutionsent://SD_ILS/0/SD_ILS:2932772024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Web 2.0 Web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2933522024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Dunham, Ken.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Cole, Eric. Ring, Sandra.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:1464752024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Contos, Brian T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102024-12-26T14:27:00Z2024-12-26T14:27:00ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>