81. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


82. Hacker's challenge2 : test your network security
Author: / Mike Schiffman...[etal]
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security.,Computer hackers.
Classification :
QA76
.
9
.
A25


83. Hacker's underground handbook :
Author: David Melnichuk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Hackers.
Classification :
QA76
.
9
.
A25
D385
2010


84. Hacker techniques, tools, and incident handling
Author: Oryano, Sean-Philip
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Computers hackers
Classification :
QA
76
.
9
.
A25H3


85. Hackers :
Author: Paul A. Taylor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Netherlands.,Freedom of information-- Netherlands.,Hackers-- Netherlands-- Attitudes.,Computer crimes.,Freedom of information.,TRUE CRIME-- White Collar Crime.,Netherlands., 7
Classification :
HV6773
.
3
.
N4
T39
1999eb


86. Hackers bewar
Author: / Eric Cole
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer hackers.,Computer security.
Classification :
QA
,
76
.
9
,.
A25
,
C597
,
2002


87. Hackers beware
Author: Cole, Eric.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,، Computer hackers
Classification :
QA
76
.
9
.
A25
C597


88. Hackers beware
Author: Cole, Eric
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security►Computer hackers
Classification :
76
.
9
.
A25
,
C597

89. Hackers beware
Author: / Eric Cole
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computer hackers
Classification :
QA
76
.
9
.
A25
C597
2002


90. Hacking
Author: Pankaj, S.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,، Computer hackers,، Computer networks--Security measures,، Internet--Security measures
Classification :
QA
76
.
9
.
A25
P35
2005


91. Hacking /
Author: by Kevin Beaver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Hackers.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B42
2018


92. Hacking Linux exposed :
Author: by Brian Hatch, James Lee, George Kurtz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux (Computer file),Linux.,Computer security.,Computer security.
Classification :
QA76
.
76
.
O63
H375
2001


93. Hacking cyberspace
Author: David J. Gunkel.,Gunkel, David J.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security.,Hackers.,System programming (Computer science),Computer science.

94. Hacking cyberspace /
Author: David J. Gunkel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Systems programming (Computer science),Computer security.,Hackers.,Systems programming (Computer science)
Classification :
QA76
.
9
.
A25
G86
2001


95. Hacking for dummie
Author: / by Kevin Beaver
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer hackers.,Computer networks--Security measures,Computer security.
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2007


96. Hacking for dummies
Author: / by Kevin Beaver
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Hackers.
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2010


97. Hacking for dummies
Author: / by Kevin Beaver
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer hackers.
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2004


98. Hacking for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Hackers. ;

99. Hacking for dummies
Author: by Kevin Beaver
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Computer networks- Security measures,Computer hackers
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2004


100. Hacking for dummies
Author: Beaver, Kevin.
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,Security measures ، Computer networks,، Hackers
Classification :
QA
76
.
9
.
A25
B42
2010

