1. CEH
Author: \ Kimberly Graves.
Library: The library of the holy threshold of Hazrat Fatima Masoumeh (peace be upon her) (Qom)
Subject: Electronic data processing personnel-- Certification.,Computer security-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Hackers-- Examinations, Study guides.,Computer networks-- Examinations, Study guides.
Classification :
QA76
.
3
.
G6875
2010


2. CEH
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing personnel ; Certification. ; Computer security ; Examinations ; Study guides. ; Penetration testing (Computer security) ; Examinations ; Study guides. ; Hackers ; Examinations ; Study guides. ; Computer networks ; Examinations ;

3. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic data processing personnel--Certification,Computer security--Examinations--Study guides,Penetration testing (Computer security)--Examinations--Study guides,Hackers--Examinations--Study guides,Computer networks--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
G6875
,
2010


4. CEH Certified Ethical Hacker
Author: / Kimberly Graves
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Electronic data processing personnel - Certification,Computer security - Examinations - Study guides,Penetration testing (Computer security) - Examinations - Study guides,Computer hackers - Examinations - Study guides,Computer networks - Examinations - Study guides,داده پردازی - کارمندان - گواهینامه,کامپیوترها - ایمنی اطلاعات - آزمون ها - راهنمای مطالعه,آزمایش نفوذ (ایمنسازی کامپیوتر) - آزمون ها - راهنمای مطالعه,هکرها - آزمون ها- راهنمای مطالعه,شبکههای کامپیوتری - آزمون ها - راهنمای مطالعه
Classification :
QA76
,.
3
.
G6875
2010


5. CEH certified ethical hacker :
Author: Matt Walker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
W345
2016b


6. CEH certified ethical hacker study guide :
Author: Sean-Philip Oriyano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Hackers-- Certification,Penetration testing (Computer security)-- Examinations, Study guides
Classification :
QA76
.
9
.
A25


7. CEH v10 :
Author: Ric Messier.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS / Security / General.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25


8. CEHv8 :
Author: Sean-Philip Oriyano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Hackers-- Certification, Study guides,Penetration testing (Computer security)-- Examinations, Study guides
Classification :
QA76
.
9
.
A25


9. Official certified ethical hacker review guide
Author: / Steven DeFino
Library: (South Khorasan)
Subject: Electronic data processing personnel--Certification,Computer security--Examinations--Study guides,Penetration testing (Computer security)--Study guides,Computer hackers--Examinations--Study guides,Computer networks--Examinations--Study guides
Classification :
QA76
.
3
.
D445
2010

