1. Android hacker's handbook /
Author: Joshua J. Drake [and five others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Android (Electronic resource),Application software-- Development.,Computer security.,Hackers.,Mobile computing.

2. Applied Network Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.
Classification :
T55
.
4-60
.
8


3. Becoming an ethical hacker
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Handbooks, manuals, etc. ; Computer security ; Handbooks, manuals, etc. ; Hackers. ; Computer security. ; fast ; (

4. Biohackers :
Author: Alessandro Delfanti
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
HV6773
.
D45
2013


5. Black Hat Go :
Author: Tom Steele, Chris Patten, and Dan Kottmann.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Go (Computer program language),Penetration testing (Computer security),COMPUTERS / Security / Networking.,Go (Computer program language),Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


6. Black hat :
Author: John Biggs
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.
Classification :
QA76
.
9
.
A25
B539
2004


7. Black hat Python :
Author: by Justin Seitz
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Python (Computer program language)
Classification :
QA76
.
9
.
A25
S456
2015


8. Business data communications
Author: Manish Agrawal
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Business enterprises, Computer networks,Computer networks,Data transmission systems,Information technology, Management
Classification :
HF
5548
,.
2
.
A35B8
2011


9. CEH
Author: \ Kimberly Graves.
Library: The library of the holy threshold of Hazrat Fatima Masoumeh (peace be upon her) (Qom)
Subject: Electronic data processing personnel-- Certification.,Computer security-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Hackers-- Examinations, Study guides.,Computer networks-- Examinations, Study guides.
Classification :
QA76
.
3
.
G6875
2010


10. CEH
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing personnel ; Certification. ; Computer security ; Examinations ; Study guides. ; Penetration testing (Computer security) ; Examinations ; Study guides. ; Hackers ; Examinations ; Study guides. ; Computer networks ; Examinations ;

11. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic data processing personnel--Certification,Computer security--Examinations--Study guides,Hackers--Examinations--Study guides,Computer networks--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
G69
,
2007


12. CEH :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing personnel ; Certification. ; Computer security ; Examinations ; Study guides. ; Computer hackers. ; Hackers. ; fast ; (OCoLC)fst00872150 ; Computer security ; Examinations. ; fast ; (OCoLC)fst00872489 ; Electronic data processin

13. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Electronic data processing personnel --Certification,Computer security --Examinations --Study guides,Computer hackers
Classification :
005
.
8
G776c


14. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic data processing personnel--Certification,Computer security--Examinations--Study guides,Penetration testing (Computer security)--Examinations--Study guides,Hackers--Examinations--Study guides,Computer networks--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
G6875
,
2010


15. CEH
پدیدآورنده : Kimberly Graves
موضوع : Electronic data processing personnel- Certification,Computer security- Examinations- Study guides,Computer hackers
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
16. CEH Certified Ethical Hacker
Author: / Kimberly Graves
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Electronic data processing personnel - Certification,Computer security - Examinations - Study guides,Penetration testing (Computer security) - Examinations - Study guides,Computer hackers - Examinations - Study guides,Computer networks - Examinations - Study guides,داده پردازی - کارمندان - گواهینامه,کامپیوترها - ایمنی اطلاعات - آزمون ها - راهنمای مطالعه,آزمایش نفوذ (ایمنسازی کامپیوتر) - آزمون ها - راهنمای مطالعه,هکرها - آزمون ها- راهنمای مطالعه,شبکههای کامپیوتری - آزمون ها - راهنمای مطالعه
Classification :
QA76
,.
3
.
G6875
2010


17. CEH certified ethical hacker :
Author: Matt Walker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
W345
2016b


18. CEH certified ethical hacker study guide :
Author: Sean-Philip Oriyano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Hackers-- Certification,Penetration testing (Computer security)-- Examinations, Study guides
Classification :
QA76
.
9
.
A25


19. CEH v10 :
Author: Ric Messier.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS / Security / General.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25


20. CEHv8 :
Author: Sean-Philip Oriyano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Hackers-- Certification, Study guides,Penetration testing (Computer security)-- Examinations, Study guides
Classification :
QA76
.
9
.
A25

