Search Results for Penetration testing (Computer security) - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dPenetration$002btesting$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-04-27T13:40:04ZKali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:11305882026-04-27T13:40:04Z2026-04-27T13:40:04Zby Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-04-27T13:40:04Z2026-04-27T13:40:04Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-04-27T13:40:04Z2026-04-27T13:40:04Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>