Search Results for Penetration testing (Computer security) - Narrowed by: EnglishSirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?2026-01-18T15:10:44ZPenetration testing services procurement guideent://SD_ILS/0/SD_ILS:10370842026-01-18T15:10:44Z2026-01-18T15:10:44Zby Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format: Electronic Resources<br/>Linux basics for hackers : getting started with networking, scripting, and security in Kalient://SD_ILS/0/SD_ILS:11445182026-01-18T15:10:44Z2026-01-18T15:10:44Zby OccupyTheWeb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5647551">Click to View</a><br/>Format: Electronic Resources<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:11411112026-01-18T15:10:44Z2026-01-18T15:10:44Zby Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing with shellcode : detect, exploit, and secure network-level and operating system vulnerabilitiesent://SD_ILS/0/SD_ILS:11357222026-01-18T15:10:44Z2026-01-18T15:10:44Zby Megahed, Hamza, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5301594">Click to View</a><br/>Format: Electronic Resources<br/>Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linuxent://SD_ILS/0/SD_ILS:11362232026-01-18T15:10:44Z2026-01-18T15:10:44Zby Najera-Gutierrez, Gilberto, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5314613">Click to View</a><br/>Format: Electronic Resources<br/>Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackersent://SD_ILS/0/SD_ILS:11362312026-01-18T15:10:44Z2026-01-18T15:10:44Zby Chebbi, Chiheb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5314621">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing essentialsent://SD_ILS/0/SD_ILS:11301112026-01-18T15:10:44Z2026-01-18T15:10:44Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5086913">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:11305882026-01-18T15:10:44Z2026-01-18T15:10:44Zby Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:11237222026-01-18T15:10:44Z2026-01-18T15:10:44Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format: Electronic Resources<br/>Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentationent://SD_ILS/0/SD_ILS:11277352026-01-18T15:10:44Z2026-01-18T15:10:44Zby McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:11283502026-01-18T15:10:44Z2026-01-18T15:10:44Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4924076">Click to View</a><br/>Format: Electronic Resources<br/>Coding for penetration testers : building better toolsent://SD_ILS/0/SD_ILS:11177372026-01-18T15:10:44Z2026-01-18T15:10:44Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4675472">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11184652026-01-18T15:10:44Z2026-01-18T15:10:44Zby Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing : a hands-on introduction to hackingent://SD_ILS/0/SD_ILS:10451932026-01-18T15:10:44Z2026-01-18T15:10:44Zby Weidman, Georgia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931614">Click to View</a><br/>Format: Electronic Resources<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192026-01-18T15:10:44Z2026-01-18T15:10:44Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysisent://SD_ILS/0/SD_ILS:11421422026-01-18T15:10:44Z2026-01-18T15:10:44Zby Bramwell, Phil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520896">Click to View</a><br/>Format: Electronic Resources<br/>Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:11334342026-01-18T15:10:44Z2026-01-18T15:10:44Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessmentent://SD_ILS/0/SD_ILS:11255492026-01-18T15:10:44Z2026-01-18T15:10:44Zby Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments.ent://SD_ILS/0/SD_ILS:11112142026-01-18T15:10:44Z2026-01-18T15:10:44Zby Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backboxent://SD_ILS/0/SD_ILS:10268632026-01-18T15:10:44Z2026-01-18T15:10:44Zby Uygur, Stefan Umit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1611819">Click to View</a><br/>Format: Electronic Resources<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:9874712026-01-18T15:10:44Z2026-01-18T15:10:44Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826967">Click to View</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:10158672026-01-18T15:10:44Z2026-01-18T15:10:44Zby Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format: Electronic Resources<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:9835212026-01-18T15:10:44Z2026-01-18T15:10:44Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format: Electronic Resources<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:1372132026-01-18T15:10:44Z2026-01-18T15:10:44Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : techniques for ethical hacking with Pythonent://SD_ILS/0/SD_ILS:11385272026-01-18T15:10:44Z2026-01-18T15:10:44Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5405700">Click to View</a><br/>Format: Electronic Resources<br/>Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Pythonent://SD_ILS/0/SD_ILS:11396652026-01-18T15:10:44Z2026-01-18T15:10:44Zby Chebbi, Chiheb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5439458">Click to View</a><br/>Format: Electronic Resources<br/>Learning Python web penetration testing : automate web penetration testing activities using Phytonent://SD_ILS/0/SD_ILS:11396672026-01-18T15:10:44Z2026-01-18T15:10:44Zby Martorella, Christian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5439460">Click to View</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : employ the power of Python to get the best out of pentestingent://SD_ILS/0/SD_ILS:10452812026-01-18T15:10:44Z2026-01-18T15:10:44Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935712">Click to View</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : employ the power of Python to get the best out of pentestingent://SD_ILS/0/SD_ILS:10452862026-01-18T15:10:44Z2026-01-18T15:10:44Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935718">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit penetration testing cookbookent://SD_ILS/0/SD_ILS:10212802026-01-18T15:10:44Z2026-01-18T15:10:44Zby Agarwal, Monika.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477469">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:10141912026-01-18T15:10:44Z2026-01-18T15:10:44Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:11389602026-01-18T15:10:44Z2026-01-18T15:10:44Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5419743">Click to View</a><br/>Format: Electronic Resources<br/>Ethical hackerent://SD_ILS/0/SD_ILS:11322362026-01-18T15:10:44Z2026-01-18T15:10:44Zby Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format: Electronic Resources<br/>Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsent://SD_ILS/0/SD_ILS:10451872026-01-18T15:10:44Z2026-01-18T15:10:44Zby Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:10317542026-01-18T15:10:44Z2026-01-18T15:10:44Zby Makan, Keith, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688642">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5ent://SD_ILS/0/SD_ILS:10064962026-01-18T15:10:44Z2026-01-18T15:10:44Zby Pritchett, Willie.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108337">Click to View</a><br/>Format: Electronic Resources<br/>Hacking and penetration testing with low power devicesent://SD_ILS/0/SD_ILS:10370612026-01-18T15:10:44Z2026-01-18T15:10:44Zby Polstra, Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778476">Click to View</a><br/>Format: Electronic Resources<br/>Python for offensive PenTest : a practical guide to ethical hacking and penetration testing using Pythonent://SD_ILS/0/SD_ILS:11374412026-01-18T15:10:44Z2026-01-18T15:10:44Zby Khrais, Hussam, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5371678">Click to View</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:11038742026-01-18T15:10:44Z2026-01-18T15:10:44Zby Long, Johnny, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4092861">Click to View</a><br/>Format: Electronic Resources<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852026-01-18T15:10:44Z2026-01-18T15:10:44Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Electronic Resources<br/>Learning Metasploit exploitation and developmentent://SD_ILS/0/SD_ILS:10157102026-01-18T15:10:44Z2026-01-18T15:10:44Zby Balapure, Aditya.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1236046">Click to View</a><br/>Format: Electronic Resources<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:10034262026-01-18T15:10:44Z2026-01-18T15:10:44Zby Neely, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1059696">Click to View</a><br/>Format: Electronic Resources<br/>The car hacker's handbook : a guide for the penetration testerent://SD_ILS/0/SD_ILS:11104392026-01-18T15:10:44Z2026-01-18T15:10:44Zby Smith, Craig (Reverse engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503176">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-01-18T15:10:44Z2026-01-18T15:10:44Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452026-01-18T15:10:44Z2026-01-18T15:10:44Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162026-01-18T15:10:44Z2026-01-18T15:10:44Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing frameworkent://SD_ILS/0/SD_ILS:9971912026-01-18T15:10:44Z2026-01-18T15:10:44Zby Singh, Abhinav.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=952079">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5ent://SD_ILS/0/SD_ILS:9968252026-01-18T15:10:44Z2026-01-18T15:10:44Zby Ramachandran, Vivek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948547">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guideent://SD_ILS/0/SD_ILS:9966062026-01-18T15:10:44Z2026-01-18T15:10:44Zby Allen, Lee.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946941">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit the penetration tester's guideent://SD_ILS/0/SD_ILS:10099662026-01-18T15:10:44Z2026-01-18T15:10:44Zby Kennedy, David, 1982-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137562">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11839662026-01-18T15:10:44Z2026-01-18T15:10:44Zby Faircloth, Jeremy.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-01-18T15:10:44Z2026-01-18T15:10:44Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942026-01-18T15:10:44Z2026-01-18T15:10:44Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-01-18T15:10:44Z2026-01-18T15:10:44Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>