201. <The> Basics of Web Hacking
Author: \ Josh Pauli ; Scott White, technical editor
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاهها -- تدابیر ایمنی,برنامههای کاربردی وب -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمنسازی کامپیوتر)
Classification :
TK5105
.
59
.
P38B3
2013


202. The Best of 2600
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2009


203. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


204. The CEH prep guide :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.
Classification :
QA76
.
9
.
A25
K79
2007eb


205. The art of deception
Author: / Kevin D. Mitnick and William L. Simon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Information technology- Social aspects,Computer hackers
Classification :
QA76
.
9
.
A25
,
M585
2002


206. The art of deception
Author: / Kevin D. Mitnick and William L. Simon
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Information technology--Social aspects,Computer hackers
Classification :
EB
,
QA76
.
9
.
A25M58
2002

207. The art of deception: controlling the human element of security
Author: Mitnick, Kevin D.)Kevin David(
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,Social aspects ، Information technology,، Computer hackers
Classification :
QA
76
.
9
.
A25
M585
2002


208. The art of intrusion :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Hackers ;

209. The art of intrusion
Author: / Kevin D. Mitnick, William L. Simon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer hackers.
Classification :
QA
,
76
.
9
,.
A25
,
M587
,
2005


210. The art of intrusion :the real stories behind the exploits of hackers, intruders, & deceivers
Author: / Kevin D. Mitnick, William L. Simon
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Hackers
Classification :
QA76
.
9
.
A2M5


211. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
Author: Mitnick, Kevin D. )Kevin David(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computer hackers
Classification :
QA
76
.
9
.
A25
.
M587
2005


212. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

213. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

214. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


215. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

216. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

217. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


218. The best of 2600 :
Author: Emmanuel Goldstein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2008


219. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012


220. The fugitive game
Author: / Jonathan Littman
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Mitnick, Kevin D.--(Kevin David),--1963,Computer crimes--United States--Investigation,Hackers--United States--Psychology,Internet--Security measures--United States
Classification :
HV
,
6773
.
2
,.
L57
,
1996

