• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶ پاسخ غیر تکراری از ۱۶ پاسخ تکراری در مدت زمان ۰,۴۱ ثانیه یافت شد.

1. Advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wil Allsopp.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

2. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.

Classification :
TK5105
.
59

3. CEH v10 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ric Messier.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS / Security / General.,Electronic data processing personnel-- Certification.

Classification :
QA76
.
9
.
A25

4. CompTIA PenTest+dollar5Practice Test :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Crystal Panek, Robb Tracy.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Examinations, questions, etc.,Penetration testing (Computer security), Examinations, questions, etc.,Telecommunications engineers-- Certification, Examinations, questions, etc.,Computer networks-- Security measures.,COMPUTERS / Networking / Security.,COMPUTERS / Security / General.,COMPUTERS / Security / Online Safety & Privacy.,Penetration testing (Computer security),Telecommunications engineers-- Certification.

Classification :
TK5105
.
59

5. Fuzzing for software security testing and quality assurance /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
F89
2018eb

6. How to cheat at managing information security /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mark Osborne ; Paul M. Summitt, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
O83
2006eb

7. Joomla! web security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Tom Canavan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Joomla! (Computer file),Joomla! (Computer file),Joomla! (Computer file),Computer networks-- Security measures.,Web site development.,Web sites-- Authoring programs.,Web sites-- Security measures.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Web site development.,Web site development.,Web sites-- Authoring programs.,Web sites-- Authoring programs.,Web sites-- Security measures.,Web sites-- Security measures.

Classification :
TK5105
.
59
.
C36
2008

8. Learn Ethical Hacking from Scratch :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)

Classification :
TK5105
.
59
.
S33
2018

9. Learn Social Engineering :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Penetration testing (Computer security),Social engineering.,Computer networks-- Security measures.,Computer security.,Computers-- Internet-- Security.,Computers-- Networking-- Security.,Computers-- Security-- General.,Network security.,Penetration testing (Computer security),Privacy & data protection.,Social engineering.

Classification :
TK5105
.
59
.
O953
2018eb

10. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

11. Network security assessment :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Steve Manzuik, André Gold, Chris Gatford.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Evaluation-- Methodology.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
M38
2007eb

12. Nmap :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Paulino Calderon.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Monitoring-- Computer programs.,Computer networks-- Security measures-- Computer programs.,Penetration testing (Computer security),Computer networks-- Security measures-- Computer programs.,COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference,Penetration testing (Computer security)

Classification :
TK5105
.
5485

13. Penetration tester's open source toolkit /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jeremy Faircloth ; Michael Rogers, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

14. Penetration testing bootcamp :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jason Beltrame.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Application software-- Testing.,Computer networks-- Security measures.,Penetration testing (Computer security),Raspberry Pi (Computer),Application software-- Testing.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Penetration testing (Computer security),Raspberry Pi (Computer)

Classification :
TK5105
.
59

15. Professional penetration testing :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Thomas Wilhelm.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.

Classification :
QA76
.
9
.
W55
2010eb

16. Quick start guide to penetration testing :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sagar Rahalkar.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Metasploit (Electronic resource),Metasploit (Electronic resource),Computer networks-- Security measures-- Testing.,Penetration testing (Computer security),COMPUTERS / Security / General.,Penetration testing (Computer security)

Classification :
TK5105
.
59
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival