Arama Sonu&ccedil;lar&#305; Hackers. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dHackers.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300;jsessionid=A540BC1AE1C462D0F272CAF3F034D865? 2026-01-28T16:32:09Z Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:1045196 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:1003922 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:986773 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:1009952 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own the box ent://SD_ILS/0/SD_ILS:1188391 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:1188268 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking : sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:1188244 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Elektronik Kaynak<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:930810 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:137106 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Elektronik Kaynak<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:70005 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;G&uuml;ven, Mehmet<br/>Format:&#160;Kitap<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Social engineering the art of human hacking ent://SD_ILS/0/SD_ILS:978980 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Elektronik Kaynak<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:1188243 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Elektronik Kaynak<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:1186355 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektronik Kaynak<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Elektronik Kaynak<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1188407 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:1189637 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-01-28T16:32:09Z 2026-01-28T16:32:09Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/>