Search Results for COMPUTER NETWORKS. - Narrowed by: Computer hackers.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dCOMPUTER$002bNETWORKS.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bhackers.$002509Computer$002bhackers.$0026ps$003d300?dt=list2026-04-08T00:41:32ZProfessional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162026-04-08T00:41:32Z2026-04-08T00:41:32Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-04-08T00:41:32Z2026-04-08T00:41:32Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-04-08T00:41:32Z2026-04-08T00:41:32Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272026-04-08T00:41:32Z2026-04-08T00:41:32Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072026-04-08T00:41:32Z2026-04-08T00:41:32Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552026-04-08T00:41:32Z2026-04-08T00:41:32Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582026-04-08T00:41:32Z2026-04-08T00:41:32Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732026-04-08T00:41:32Z2026-04-08T00:41:32Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:9365672026-04-08T00:41:32Z2026-04-08T00:41:32Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462026-04-08T00:41:32Z2026-04-08T00:41:32Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512026-04-08T00:41:32Z2026-04-08T00:41:32Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452026-04-08T00:41:32Z2026-04-08T00:41:32Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>The CEH prep guide the comprehensive guide to certified ethical hackingent://SD_ILS/0/SD_ILS:9427542026-04-08T00:41:32Z2026-04-08T00:41:32Zby Krutz, Ronald L., 1938-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=315200">Click to View</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:11930162026-04-08T00:41:32Z2026-04-08T00:41:32Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-04-08T00:41:32Z2026-04-08T00:41:32Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>