Search Results for Penetration testing (Computer security) - Narrowed by: English SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300? 2026-01-18T07:52:22Z Penetration testing services procurement guide ent://SD_ILS/0/SD_ILS:1037084 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:1144518 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;OccupyTheWeb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5647551">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:1141111 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with shellcode : detect, exploit, and secure network-level and operating system vulnerabilities ent://SD_ILS/0/SD_ILS:1135722 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Megahed, Hamza, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5301594">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux ent://SD_ILS/0/SD_ILS:1136223 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Najera-Gutierrez, Gilberto, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5314613">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers ent://SD_ILS/0/SD_ILS:1136231 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5314621">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing essentials ent://SD_ILS/0/SD_ILS:1130111 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5086913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:1123722 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation ent://SD_ILS/0/SD_ILS:1127735 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit for beginners : create a threat-free environment with the best-in-class tool ent://SD_ILS/0/SD_ILS:1128350 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4924076">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:1117737 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4675472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1118465 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : a hands-on introduction to hacking ent://SD_ILS/0/SD_ILS:1045193 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Weidman, Georgia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931614">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:1007619 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis ent://SD_ILS/0/SD_ILS:1142142 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Bramwell, Phil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520896">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:1133434 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment ent://SD_ILS/0/SD_ILS:1125549 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:1111214 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox ent://SD_ILS/0/SD_ILS:1026863 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Uygur, Stefan Umit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1611819">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CISO's guide to penetration testing a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:987471 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826967">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1015867 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:983521 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:137213 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : techniques for ethical hacking with Python ent://SD_ILS/0/SD_ILS:1138527 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5405700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Python ent://SD_ILS/0/SD_ILS:1139665 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Chebbi, Chiheb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5439458">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning Python web penetration testing : automate web penetration testing activities using Phyton ent://SD_ILS/0/SD_ILS:1139667 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Martorella, Christian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5439460">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : employ the power of Python to get the best out of pentesting ent://SD_ILS/0/SD_ILS:1045281 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : employ the power of Python to get the best out of pentesting ent://SD_ILS/0/SD_ILS:1045286 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935718">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit penetration testing cookbook ent://SD_ILS/0/SD_ILS:1021280 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Agarwal, Monika.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477469">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1014191 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:1138960 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5419743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethical hacker ent://SD_ILS/0/SD_ILS:1132236 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals ent://SD_ILS/0/SD_ILS:1045187 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:1031754 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Makan, Keith, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688642">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 ent://SD_ILS/0/SD_ILS:1006496 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Pritchett, Willie.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108337">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking and penetration testing with low power devices ent://SD_ILS/0/SD_ILS:1037061 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Polstra, Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778476">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python for offensive PenTest : a practical guide to ethical hacking and penetration testing using Python ent://SD_ILS/0/SD_ILS:1137441 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Khrais, Hussam, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5371678">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:1103874 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Long, Johnny, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4092861">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning Metasploit exploitation and development ent://SD_ILS/0/SD_ILS:1015710 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Balapure, Aditya.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1236046">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:1003426 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Neely, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1059696">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The car hacker's handbook : a guide for the penetration tester ent://SD_ILS/0/SD_ILS:1110439 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Smith, Craig (Reverse engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503176">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:1015545 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework ent://SD_ILS/0/SD_ILS:997191 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Singh, Abhinav.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=952079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 ent://SD_ILS/0/SD_ILS:996825 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Ramachandran, Vivek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948547">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide ent://SD_ILS/0/SD_ILS:996606 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Allen, Lee.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit the penetration tester's guide ent://SD_ILS/0/SD_ILS:1009966 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Kennedy, David, 1982-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1183966 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Faircloth, Jeremy.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Electronic Resources<br/> Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robots ent://SD_ILS/0/SD_ILS:687423 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format:&#160;Books<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1192594 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2026-01-18T07:52:22Z 2026-01-18T07:52:22Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Electronic Resources<br/>