• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۵۳ پاسخ غیر تکراری از ۵۳ پاسخ تکراری در مدت زمان ۰,۷۸ ثانیه یافت شد.

21. Insider threat

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Eric Cole, Sandra Ring

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

Classification :

22. Mafiaboy :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael Calce and Craig Silverman.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Calce, Michael.,Calce, Michael.,Calce, Michael.,Calce, Michael.,Computer crimes.,Computer security.,Hackers-- Canada, Biography.,Criminalité informatique.,Pirates informatiques-- Canada, Biographies.,Sécurité informatique.,Computer crimes.,Computer security.,Hackers.,Canada., 7

Classification :
HV6773
.
C34
2008

23. Mobile malware attacks and defense

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Cell phone systems ; Security measures. ; Mobile communication systems ; Security measures. ; Mobile computing ; Security measures. ; Computer crimes ; Prevention. ; Computer crimes ; Case studies. ; Hackers. ; Wireless Internet ; Security measures. ;

Classification :

24. Mobile malware attacks and defense

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Ken Dunham, technical editor

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Cell phone systems--Security measures,Mobile communication systems--Security measures,Mobile computing--Security measures,Computer crimes--Prevention,Computer crimes--Case studies,Hackers.,Wireless Internet--Security measures

Classification :
TK
,
5102
.
85
,.
M62
,
2009

25. Ninja hacking :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thomas Wilhelm, Jason Andress.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer security.,Hackers.

Classification :

26. Ninja hacking : unconventional penetration testing tactics and techniques

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wilhelm, Thomas

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Penetration testing )Computer security(,، Computer security,Prevention ، Computer crimes,، Hackers

Classification :
QA
76
.
9
.
A25
W548
2011

27. Profiling hackers

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Raoul Chiesa, Stefania Ducci, Silvio Ciappi

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer crimes.,Computer security.,Computer hackers.,Criminal behavior, Prediction of.

Classification :
HV
,
6773
,.
C477
,
2009

28. Sandworm :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andy Greenberg.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Russia (Federation),Hackers-- Russia (Federation),Computer crimes.,Hackers.,SOCIAL SCIENCE / Sociology / General.,Russia (Federation), 7

Classification :
HV6773
.
R8
G74
2019

29. Spring Security 3.1

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Robert Winch, Peter Mularien

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Malware (Computer software)-- Prevention,Web sites-- Design,Web sites-- Security measures

Classification :
TK5105
.
59
.
W563
2012

30. Stealing the networ

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Raven Alder ... [et al.]

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer crimes--Fiction,Computer hackers--Fiction,Computer hackers--Psychology--Fiction,Computer security--Fiction,Identity theft--Fiction

Classification :
PS
,
648
,.
C65
,
S742
,
2005eb

31. Stealing the network

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer crimes ; Fiction. ; Computer hackers ; Fiction. ; Computer hackers ; Psychology ; Fiction. ; Computer security ; Fiction. ; Identity theft ; Fiction. ;

Classification :

32. Stealing the network : how to own an identity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Raven Alder... ]et al.[; Timothy Mullen )Thor(, contributing author and technical editor; Johnny Long, contributing author and technical editor

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Fiction ، Identity theft,Fiction ، Computer crimes,Fiction ، Computer hackers,Fiction ، Computer security,Psychology -- Fiction ، Computer hackers

Classification :
PS
648
.
C65S83

33. <The> Basics of Web Hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Josh Pauli ; Scott White, technical editor

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاه‌ها -- تدابیر ایمنی,برنامه‌های کاربردی وب -- تدابیر ایمنی,شبکه‌های کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمن‌سازی کامپیوتر)

Classification :
TK5105
.
59
.
P38B3
2013

34. The Best of 2600

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.

Classification :
QA76
.
9
.
A25
G643
2009

35. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

36. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

37. The basics of hacking and penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Patrick Engebretson

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
2013

38. The basics of hacking and penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Patrick Engebretson ; technical editor, James Broad.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

Classification :

39. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli ; Scott White, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

Classification :

40. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures

Classification :
TK5105
.
59
.
P385
2013
  • »
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival