Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Elektronik Kaynaklar
Hepsi
Başkent Üniversitesi Kütüphanesi
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Koleksiyonu
Güzel Sanatlar ve Tasarım Arşivi
Kazan Meslek Yüksekokulu
Hukuk Koleksiyonu
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Tez Koleksiyonu
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
3
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Elektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Language: English
+
Konu: Hackers.
Yazar
Dahil
Hariç
Long, Johnny.
(4)
Russell, Ryan, 1969-
(4)
Grand, Joe.
(2)
Mullen, Timothy M.
(2)
131ah.
(1)
Alder, Raven.
(1)
Baskin, Brian, author.
(1)
Bayles, Aaron W.
(1)
Black Hat Press (Goodhue, Minn.)
(1)
Brindley, Ed.
(1)
Cole, Eric.
(1)
Contos, Brian T.
(1)
Dunham, Ken.
(1)
Eeckhoutte, Peter Van, author of introduction, etc.
(1)
Engebretson, Pat (Patrick Henry), 1974-
(1)
Foster, James C.
(1)
Hurley, Chris.
(1)
Jordan, Brittney, contributor.
(1)
Libicki, Martin C., author.
(1)
Martin, Brian, editor.
(1)
Mitnick, Kevin D. (Kevin David), 1963-
(1)
Oriyano, Sean-Philip, author.
(1)
Pinzon, D. Scott.
(1)
Pollak, Julia, author.
(1)
Rand Corporation. National Security Research Division, sponsor.
(1)
Ring, Sandra.
(1)
Sachs, Marcus H.
(1)
Senty, David, author.
(1)
Shein, Rob.
(1)
Sims, Kristin, author.
(1)
Street, Jayson E., author.
(1)
Syngress Media, Inc.
(1)
Walker, Dori, cover designer.
(1)
Weidman, Georgia, author.
(1)
Wilhelm, Thomas.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Yayın Yılı
Dahil
Hariç
-
2004
(3)
2006
(3)
2005
(2)
2010
(2)
2014
(2)
2003
(1)
2007
(1)
2008
(1)
2009
(1)
2015
(1)
2017
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(18)
Computer security.
(11)
COMPUTERS -- Internet -- Security.
(7)
COMPUTERS -- Networking -- Security.
(7)
COMPUTERS -- Security -- General.
(7)
Computer networks -- Security measures.
(5)
Computer security -- Fiction.
(5)
Fiction.
(5)
Hackers -- Fiction.
(5)
Computer crimes -- Prevention.
(4)
FICTION -- General.
(4)
Short stories.
(3)
Computer crimes -- Case studies.
(2)
Computer crimes.
(2)
Computer hackers.
(2)
Cyberterrorism -- Fiction.
(2)
Cyberterrorism.
(2)
Penetration testing (Computer security)
(2)
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
(1)
COMPUTERS -- Hardware -- Personal Computers -- PCs.
(1)
Case studies.
(1)
Cell phone systems -- Security measures.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation.
(1)
Computer games -- Programming.
(1)
Computer input-output equipment.
(1)
Computer networks -- Security measures -- Fiction.
(1)
Computer networks -- Testing.
(1)
Computer security -- Examinations -- Practice.
(1)
Computer software -- Testing.
(1)
Cyberspace -- Security measures.
(1)
Data protection.
(1)
Hackers -- Psychology -- Fiction.
(1)
Hackers -- Psychology.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Kali Linux.
(1)
Microcomputers -- Maintenance and repair.
(1)
Microcomputers -- Upgrading.
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing -- Security measures.
(1)
Professions -- Supply and demand.
(1)
Reverse engineering.
(1)
Short stories
(1)
Short stories, American -- 21st century.
(1)
Short stories, American.
(1)
Suspense fiction.
(1)
Video games -- Design.
(1)
Wireless Internet -- Security measures.
(1)
Wireless communication systems.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
Ebook Central
Elsevier E-Kitap Koleksiyonu
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
18 sonuç bulundu
1
2
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
000000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Penetration testing essentials
1.
Penetration testing essentials
by
Oriyano, Sean-Philip, author.
Click to View
Format:
Dissecting the hack : the V3rb0ten network
2.
Dissecting the hack : the V3rb0ten network
by
Street, Jayson E., author.
Click to View
Format:
Penetration testing : a hands-on introduction to hacking
3.
Penetration testing : a hands-on introduction to hacking
by
Weidman, Georgia, author.
Click to View
Format:
H4ckers5 wanted : an examination of the cybersecurity labor market
4.
H4ckers5 wanted : an examination of the cybersecurity labor market
by
Libicki, Martin C., author.
Click to View
Format:
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
5.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
by
Engebretson, Pat (Patrick Henry), 1974-
ScienceDirect
https://www.sciencedirect.com/science/book/9781597496551
Format:
Professional penetration testing : creating and operating a formal hacking lab
6.
Professional penetration testing : creating and operating a formal hacking lab
by
Wilhelm, Thomas.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597494250
Format:
Mobile malware attacks and defense
7.
Mobile malware attacks and defense
by
Dunham, Ken.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492980
Format:
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
8.
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
by
Long, Johnny.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597492157
Format:
Stealing the network : how to own a shadow: the chase for Knuth
9.
Stealing the network : how to own a shadow: the chase for Knuth
by
Long, Johnny.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490818
Format:
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
10.
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
by
Contos, Brian T.
ScienceDirect
https://www.sciencedirect.com/science/book/9781597491297
Format:
Joe Grand's "best of" hardware, wireless & game console hacking : includes DVD with 20 hacks in high-res color
11.
Joe Grand's "best of" hardware, wireless & game console hacking : includes DVD with 20 hacks in high-res color
by
Grand, Joe.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597491136
Format:
Insider threat : protecting the enterprise from sabotage, spying, and theft
12.
Insider threat : protecting the enterprise from sabotage, spying, and theft
by
Cole, Eric.
ScienceDirect
http://www.sciencedirect.com/science/book/9781597490481
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
Search Results
Elektronik Kaynaklar
Search Results
Elektronik Kaynaklar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Elektronik Kaynaklar
Sonuçlar alınıyor Elektronik Kaynaklar...
action
Go to:
Search Results
|
Search Facets
|
Top of Page