Arama Sonu&ccedil;lar&#305; Hackers. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dHackers.$0026ic$003dtrue$0026ps$003d300? 2026-01-26T20:30:27Z Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> iOS hacker's handbook ent://SD_ILS/0/SD_ILS:987123 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Miller, Charles, 1951-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821875">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Android hacker's handbook ent://SD_ILS/0/SD_ILS:1029361 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Drake, Joshua J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1662701">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Berek &amp; Hacker's gynecologic oncology ent://SD_ILS/0/SD_ILS:1048731 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Berek, Jonathan S., editor, illustrator.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2035688">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The browser hacker's handbook ent://SD_ILS/0/SD_ILS:1027943 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Alcorn, Wade.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641459">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Antivirus hacker's handbook ent://SD_ILS/0/SD_ILS:1046451 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Koret, Joxean, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1985804">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hackers crime in the digital sublime ent://SD_ILS/0/SD_ILS:924203 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Taylor, Paul A., 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=166300">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The mobile application hacker's handbook ent://SD_ILS/0/SD_ILS:1042742 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Chell, Dominic, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Design for hackers reverse-engineering beauty ent://SD_ILS/0/SD_ILS:978363 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Kadavy, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=693770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X for hackers at heart ent://SD_ILS/0/SD_ILS:933862 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Potter, Bruce.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254838">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X for hackers at heart ent://SD_ILS/0/SD_ILS:1188255 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Potter, Bruce.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490405">https://www.sciencedirect.com/science/book/9781597490405</a><br/>Format:&#160;Elektronik Kaynak<br/> A hacker's guide to project management ent://SD_ILS/0/SD_ILS:938391 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Johnston, Andrew K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=288867">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux basics for hackers : getting started with networking, scripting, and security in Kali ent://SD_ILS/0/SD_ILS:1144518 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;OccupyTheWeb, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5647551">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:1045196 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Markets for cybercrime tools and stolen data : hackers' bazaar ent://SD_ILS/0/SD_ILS:1029641 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Ablon, Lillian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1666288">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:1003922 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:986773 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:1009952 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The divorce hacker's guide to untying the knot : what every woman needs to know about finances, child custody, lawyers, and planning ahead ent://SD_ILS/0/SD_ILS:1147362 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Grant, Ann E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5840521">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> iOS application security : the definitive guide for hackers and developers ent://SD_ILS/0/SD_ILS:1110417 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Thiel, David, 1980- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503142">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The car hacker's handbook : a guide for the penetration tester ent://SD_ILS/0/SD_ILS:1110439 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Smith, Craig (Reverse engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503176">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers ent://SD_ILS/0/SD_ILS:1028143 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Beggs, Robert W., author, cover designer.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644003">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:1004014 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Bathurst, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1074430">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> XDA Developers' Android hacker's toolkit the complete guide to rooting, ROMs and theming ent://SD_ILS/0/SD_ILS:996629 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Tyler, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=947227">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own the box ent://SD_ILS/0/SD_ILS:1188391 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:1188268 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Elektronik Kaynak<br/> Etik hackerl&#305;&#287;a giri&#351; ent://SD_ILS/0/SD_ILS:1174765 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Eren, Vahap<br/>Format:&#160;Kitap<br/> InfoSec career hacking : sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:1188244 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Elektronik Kaynak<br/> Joe Grand's &quot;best of&quot; hardware, wireless &amp; game console hacking : includes DVD with 20 hacks in high-res color ent://SD_ILS/0/SD_ILS:1189084 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Grand, Joe.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491136">http://www.sciencedirect.com/science/book/9781597491136</a><br/>Format:&#160;Elektronik Kaynak<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:930810 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless hacking projects for Wi-Fi enthusiasts ent://SD_ILS/0/SD_ILS:929487 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Barken, Lee.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210621">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bilgisayar su&ccedil;lar&#305; : kriminolojik, sosyolojik ve hukuki boyutlar&#305; ile ent://SD_ILS/0/SD_ILS:26668 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Yaz&#305;c&#305;o&#287;lu, Y&#305;lmaz R.<br/>Format:&#160;Kitap<br/> This is jargon file ent://SD_ILS/0/SD_ILS:135949 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Raymond, Eric S.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2009207">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2009207</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own a shadow ent://SD_ILS/0/SD_ILS:938522 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289738">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hackerlar : bilgisayar devriminin kahramanlar&#305; ent://SD_ILS/0/SD_ILS:292485 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Levy, Steven<br/>Format:&#160;Kitap<br/> Kali Linux social engineering ent://SD_ILS/0/SD_ILS:1022292 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Patel, Rahul Singh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1532001">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Game console hacking have fun while voiding your warranty ent://SD_ILS/0/SD_ILS:929486 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Grand, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210585">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacker culture ent://SD_ILS/0/SD_ILS:941955 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Thomas, Douglas, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=310568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:137106 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Elektronik Kaynak<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:70005 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;G&uuml;ven, Mehmet<br/>Format:&#160;Kitap<br/> Penetration testing essentials ent://SD_ILS/0/SD_ILS:1130111 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5086913">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration testing : a hands-on introduction to hacking ent://SD_ILS/0/SD_ILS:1045193 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Weidman, Georgia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931614">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Steal this computer book 3 what they won't tell you about the Internet ent://SD_ILS/0/SD_ILS:1058445 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Wang, Wally.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017615">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Emperor's revenge : an Oregon Files adventure ent://SD_ILS/0/SD_ILS:1227530 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Cussler, Clive, author.<br/>Format:&#160;Kitap<br/> Social engineering the art of human hacking ent://SD_ILS/0/SD_ILS:978980 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CEH certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:963360 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Graves, Kimberly, 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=516952">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A hacker manifesto ent://SD_ILS/0/SD_ILS:1073508 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Wark, McKenzie, 1961-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3300116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> H4ckers5 wanted : an examination of the cybersecurity labor market ent://SD_ILS/0/SD_ILS:1034674 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1746758">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:1015545 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and the law challenges, issues, and outcomes ent://SD_ILS/0/SD_ILS:1004917 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Brenner, Susan W., 1947-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085118">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cypherpunks : freedom and the future of the internet ent://SD_ILS/0/SD_ILS:1112426 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Applebaum, Jacob, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4535983">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The CEH prep guide the comprehensive guide to certified ethical hacking ent://SD_ILS/0/SD_ILS:942754 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Krutz, Ronald L., 1938-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=315200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:933860 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Alder, Raven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254836">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1015867 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:1191812 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Dunham, Ken.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492980">https://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Elektronik Kaynak<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:1193016 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:1188243 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware hacking : have fun while voiding your warranty ent://SD_ILS/0/SD_ILS:1188412 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Grand, Joe.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266832">https://www.sciencedirect.com/science/book/9781932266832</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethical hacker ent://SD_ILS/0/SD_ILS:1132236 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtual justice the new laws of online worlds ent://SD_ILS/0/SD_ILS:1095979 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Lastowka, F. Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3420919">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics an essential guide for accountants, lawyers, and managers ent://SD_ILS/0/SD_ILS:978414 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Sheetz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694238">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Elektronik Kaynak<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:1186355 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Elektronik Kaynak<br/> The social media reader ent://SD_ILS/0/SD_ILS:991013 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Mandiberg, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=865738">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektronik Kaynak<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:1188263 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise directory and security implementation guide : designing and implementing directories in your organization ent://SD_ILS/0/SD_ILS:1185037 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Carrington, Charles (Charles Dudley)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780121604523">http://www.sciencedirect.com/science/book/9780121604523</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Elektronik Kaynak<br/> Data Security in the Age of Big Data in the Financial Industry ent://SD_ILS/0/SD_ILS:682199 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Noutoua, Jean Sylvestre, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824619">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824619</a><br/>Format:&#160;Kitap<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektronik Kaynak<br/> Google talking ent://SD_ILS/0/SD_ILS:1188260 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490559">https://www.sciencedirect.com/science/book/9781597490559</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security ent://SD_ILS/0/SD_ILS:1187945 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Chandra, Praphul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:1188375 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836364">http://www.sciencedirect.com/science/book/9781931836364</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1188407 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing windows server update services ent://SD_ILS/0/SD_ILS:1188482 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Barber, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490276">https://www.sciencedirect.com/science/book/9781597490276</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security : a practical approach ent://SD_ILS/0/SD_ILS:1185353 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Harrington, Jan L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123116338">https://www.sciencedirect.com/science/book/9780123116338</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> Inside the SPAM cartel : trade secrets from the dark side ent://SD_ILS/0/SD_ILS:1188413 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266863">http://www.sciencedirect.com/science/book/9781932266863</a><br/>Format:&#160;Elektronik Kaynak<br/> Telecommunications law in the Internet age ent://SD_ILS/0/SD_ILS:1185271 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Black, Sharon K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558605466">http://www.sciencedirect.com/science/book/9781558605466</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781558605466">https://www.sciencedirect.com/science/book/9781558605466</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. ent://SD_ILS/0/SD_ILS:1188342 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing and Developing Two Educational Tools on ARP Spoofing Attacks ent://SD_ILS/0/SD_ILS:689772 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Brown, Ariana, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10787170">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10787170</a><br/>Format:&#160;Kitap<br/> Understanding William Gibson ent://SD_ILS/0/SD_ILS:1107235 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Miller, Gerald Alva, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4397209">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Young Adult&rsquo;s Guide to Identity Theft : A Step-by-Step Guide to Stopping Scammers. ent://SD_ILS/0/SD_ILS:1151076 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Turner, Myra Faye.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4761262">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Crisis and escalation in cyberspace ent://SD_ILS/0/SD_ILS:1018542 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Libicki, Martin C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1365190">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the smart grid : next generation power grid security ent://SD_ILS/0/SD_ILS:1181832 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Flick, Tony.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495707">https://www.sciencedirect.com/science/book/9781597495707</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:1192800 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:1189637 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft log parser toolkit ent://SD_ILS/0/SD_ILS:1188402 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Giuseppini, Gabriele.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266528">https://www.sciencedirect.com/science/book/9781932266528</a><br/>Format:&#160;Elektronik Kaynak<br/> Residue Number System Based Fault Tolerant Scheme for Enhancing Rivest Shamir Adleman Encryption Scheme ent://SD_ILS/0/SD_ILS:694772 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Salifu, Abdul-Mumin, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686</a><br/>Format:&#160;Kitap<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:1189704 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-01-26T20:30:27Z 2026-01-26T20:30:27Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/>