Search Results for COMPUTER NETWORKS. - Narrowed by: Computer hackers.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dCOMPUTER$002bNETWORKS.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bhackers.$002509Computer$002bhackers.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-31T16:49:35ZProfessional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162026-03-31T16:49:35Z2026-03-31T16:49:35Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-03-31T16:49:35Z2026-03-31T16:49:35Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-03-31T16:49:35Z2026-03-31T16:49:35Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272026-03-31T16:49:35Z2026-03-31T16:49:35Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072026-03-31T16:49:35Z2026-03-31T16:49:35Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552026-03-31T16:49:35Z2026-03-31T16:49:35Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582026-03-31T16:49:35Z2026-03-31T16:49:35Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732026-03-31T16:49:35Z2026-03-31T16:49:35Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:9365672026-03-31T16:49:35Z2026-03-31T16:49:35Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462026-03-31T16:49:35Z2026-03-31T16:49:35Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512026-03-31T16:49:35Z2026-03-31T16:49:35Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452026-03-31T16:49:35Z2026-03-31T16:49:35Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>The CEH prep guide the comprehensive guide to certified ethical hackingent://SD_ILS/0/SD_ILS:9427542026-03-31T16:49:35Z2026-03-31T16:49:35Zby Krutz, Ronald L., 1938-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=315200">Click to View</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:11930162026-03-31T16:49:35Z2026-03-31T16:49:35Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-03-31T16:49:35Z2026-03-31T16:49:35Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>