21. Insider threat
Author: / Eric Cole, Sandra Ring
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

22. Mafiaboy :
Author: Michael Calce and Craig Silverman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Calce, Michael.,Calce, Michael.,Calce, Michael.,Calce, Michael.,Computer crimes.,Computer security.,Hackers-- Canada, Biography.,Criminalité informatique.,Pirates informatiques-- Canada, Biographies.,Sécurité informatique.,Computer crimes.,Computer security.,Hackers.,Canada., 7
Classification :
HV6773
.
C34
2008


23. Mobile malware attacks and defense
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cell phone systems ; Security measures. ; Mobile communication systems ; Security measures. ; Mobile computing ; Security measures. ; Computer crimes ; Prevention. ; Computer crimes ; Case studies. ; Hackers. ; Wireless Internet ; Security measures. ;

24. Mobile malware attacks and defense
Author: / Ken Dunham, technical editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cell phone systems--Security measures,Mobile communication systems--Security measures,Mobile computing--Security measures,Computer crimes--Prevention,Computer crimes--Case studies,Hackers.,Wireless Internet--Security measures
Classification :
TK
,
5102
.
85
,.
M62
,
2009


25. Ninja hacking :
Author: Thomas Wilhelm, Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Hackers.

26. Ninja hacking : unconventional penetration testing tactics and techniques
Author: Wilhelm, Thomas
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer security,Prevention ، Computer crimes,، Hackers
Classification :
QA
76
.
9
.
A25
W548
2011


27. Profiling hackers
Author: / Raoul Chiesa, Stefania Ducci, Silvio Ciappi
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.,Computer hackers.,Criminal behavior, Prediction of.
Classification :
HV
,
6773
,.
C477
,
2009


28. Sandworm :
Author: Andy Greenberg.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Russia (Federation),Hackers-- Russia (Federation),Computer crimes.,Hackers.,SOCIAL SCIENCE / Sociology / General.,Russia (Federation), 7
Classification :
HV6773
.
R8
G74
2019


29. Spring Security 3.1
Author: Robert Winch, Peter Mularien
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Malware (Computer software)-- Prevention,Web sites-- Design,Web sites-- Security measures
Classification :
TK5105
.
59
.
W563
2012


30. Stealing the networ
Author: / Raven Alder ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Fiction,Computer hackers--Fiction,Computer hackers--Psychology--Fiction,Computer security--Fiction,Identity theft--Fiction
Classification :
PS
,
648
,.
C65
,
S742
,
2005eb


31. Stealing the network
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Fiction. ; Computer hackers ; Fiction. ; Computer hackers ; Psychology ; Fiction. ; Computer security ; Fiction. ; Identity theft ; Fiction. ;

32. Stealing the network : how to own an identity
Author: Raven Alder... ]et al.[; Timothy Mullen )Thor(, contributing author and technical editor; Johnny Long, contributing author and technical editor
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Fiction ، Identity theft,Fiction ، Computer crimes,Fiction ، Computer hackers,Fiction ، Computer security,Psychology -- Fiction ، Computer hackers
Classification :
PS
648
.
C65S83


33. <The> Basics of Web Hacking
Author: \ Josh Pauli ; Scott White, technical editor
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاهها -- تدابیر ایمنی,برنامههای کاربردی وب -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمنسازی کامپیوتر)
Classification :
TK5105
.
59
.
P38B3
2013


34. The Best of 2600
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2009


35. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

36. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

37. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


38. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

39. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

40. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013

