• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۶ پاسخ غیر تکراری از ۱۶ پاسخ تکراری در مدت زمان ۰,۵۰ ثانیه یافت شد.

1. Advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wil Allsopp.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

2. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.

Classification :
TK5105
.
59

3. CEH v10 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ric Messier.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS / Security / General.,Electronic data processing personnel-- Certification.

Classification :
QA76
.
9
.
A25

4. CompTIA PenTest+dollar5Practice Test :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Crystal Panek, Robb Tracy.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Examinations, questions, etc.,Penetration testing (Computer security), Examinations, questions, etc.,Telecommunications engineers-- Certification, Examinations, questions, etc.,Computer networks-- Security measures.,COMPUTERS / Networking / Security.,COMPUTERS / Security / General.,COMPUTERS / Security / Online Safety & Privacy.,Penetration testing (Computer security),Telecommunications engineers-- Certification.

Classification :
TK5105
.
59

5. Fuzzing for software security testing and quality assurance /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
F89
2018eb

6. How to cheat at managing information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Osborne ; Paul M. Summitt, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
O83
2006eb

7. Joomla! web security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tom Canavan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Joomla! (Computer file),Joomla! (Computer file),Joomla! (Computer file),Computer networks-- Security measures.,Web site development.,Web sites-- Authoring programs.,Web sites-- Security measures.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Web site development.,Web site development.,Web sites-- Authoring programs.,Web sites-- Authoring programs.,Web sites-- Security measures.,Web sites-- Security measures.

Classification :
TK5105
.
59
.
C36
2008

8. Learn Ethical Hacking from Scratch :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)

Classification :
TK5105
.
59
.
S33
2018

9. Learn Social Engineering :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Penetration testing (Computer security),Social engineering.,Computer networks-- Security measures.,Computer security.,Computers-- Internet-- Security.,Computers-- Networking-- Security.,Computers-- Security-- General.,Network security.,Penetration testing (Computer security),Privacy & data protection.,Social engineering.

Classification :
TK5105
.
59
.
O953
2018eb

10. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

11. Network security assessment :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steve Manzuik, André Gold, Chris Gatford.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Evaluation-- Methodology.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
M38
2007eb

12. Nmap :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Paulino Calderon.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Monitoring-- Computer programs.,Computer networks-- Security measures-- Computer programs.,Penetration testing (Computer security),Computer networks-- Security measures-- Computer programs.,COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference,Penetration testing (Computer security)

Classification :
TK5105
.
5485

13. Penetration tester's open source toolkit /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jeremy Faircloth ; Michael Rogers, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

14. Penetration testing bootcamp :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jason Beltrame.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Application software-- Testing.,Computer networks-- Security measures.,Penetration testing (Computer security),Raspberry Pi (Computer),Application software-- Testing.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Penetration testing (Computer security),Raspberry Pi (Computer)

Classification :
TK5105
.
59

15. Professional penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Thomas Wilhelm.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.

Classification :
QA76
.
9
.
W55
2010eb

16. Quick start guide to penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sagar Rahalkar.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Metasploit (Electronic resource),Metasploit (Electronic resource),Computer networks-- Security measures-- Testing.,Penetration testing (Computer security),COMPUTERS / Security / General.,Penetration testing (Computer security)

Classification :
TK5105
.
59
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival