• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۰ پاسخ غیر تکراری از ۱۰ پاسخ تکراری در مدت زمان ۰,۵۳ ثانیه یافت شد.

1. BackTrack 5 wireless penetration testing

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Vivek Ramachandran

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures

Classification :
TK5103
.
4885
R355
2011

2. Becoming the hacker :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Adrian Pruteanu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

3. Instant penetration testing

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Vyacheslav Fadyushin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
F33
2013

4. Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sharma, Himanshu

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Penetration testing )Computer security(,، Computer security,، Computers -- Access control,، Computer networks -- Security measures

Classification :
QA
76
.
9
.
A25S522

5. Kali Linux network scanning cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Justin Hutchens

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
H883
2014

6. Metasploit

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by David Kennedy ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Open source software,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
M4865
2011

7. Metasploit penetration testing cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
S56
2012

8. Metasploit penetration testing cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Monika Agarwal, Abhinav Singh

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
A34
2013

9. Penetration tester's open source toolkit /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jeremy Faircloth ; Michael Rogers, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

10. Penetration tester's open source toolkit

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Penetration testing (Computer security) ; Computers ; Access control. ; Computer networks ; Security measures. ;

Classification :
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival