101. Hacking for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Computer networks ; Security measures ; Hackers ;

102. Hacking the cable modem
Author: / by DerEngel
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Modems Handbooks, manuals, etc,Computer hackers Handbooks, manuals, etc
Classification :
E-BOOK

103. Hacking the cable modem
Author: / by DerEngel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Modems Handbooks, manuals, etc,Computer hackers Handbooks, manuals, etc
Classification :
TK7887
.
8
.
M63
,
H37
2006


104. Hacking the future :
Author: Cole Stryker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming-- Moral and ethical aspects.,Computer security.,Hackers.,Hacktivism.,Identity (Psychology),Internet-- Security measures.,Internet.,Online identities.,Privacy.,Computer programming-- Moral and ethical aspects.,Computer security.,Hackers.,Hacktivism.,Identity (Psychology),Internet-- Security measures.,Internet.,Online identities.,Privacy.
Classification :
QA76
.
9
.
M65
S87
2012


105. Hacking the xbox :
Author: Andrew "Bunnie" Huang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Reverse engineering.

106. Hacking tools & techniques and incident handling
Author: / Nem Pal Singh ...[et al.]
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25
H3
2003


107. Hacking tools & techniques and incident handling
Author:
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Computer hackers
Classification :
QA
76
.
9
.
A25
H34
2004


108. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


109. Hands-on bug hunting for penetration testers :
Author: Joseph Marshall.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Monitoring.,Computer networks-- Security measures.,Penetration testing (Computer security),Web applications.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Penetration testing (Computer security),Web applications.
Classification :
TK5105
.
5485


110. Hands-on penetration testing on Windows :
Author: Phil Bramwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Microsoft Windows (Computer file),Kali Linux.,Microsoft Windows (Computer file),Computer security.,Computers-- Access control.,Penetration testing (Computer security),Windows PowerShell (Computer program language),Computer security.,Computers-- Access control.,Penetration testing (Computer security),Windows PowerShell (Computer program language)
Classification :
QA76
.
9
.
A25


111. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


112. Hardware-based computer security techniques to defeat hackers
Author: / Roger Dube
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Equipment and supplies,Computer security--Computer programs,Computer input-output equipment.,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
D8152
,
2008


113. Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Author: Dube, Roger
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security - Computer programs ► Computer security - Equipment and supplies ► Computer input-output equipment ► Computer crimes-Prevention
Classification :
005
D814h


114. Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Author: Dube, Roger
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security - Computer programs ► Computer security - Equipment and supplies ► Computer input-output equipment ► Computer crimes-Prevention
Classification :
005
D814h


115. Hardware hacking
Author: / Joe Grand, [technical editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microcomputers--Maintenance and repair,Microcomputers--Upgrading,Computer input-output equipment.,Hackers.,Reverse engineering.,Electronic books.--local
Classification :
TK
,
7887
,.
H37
,
2004eb


116. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011


117. Honeypot frameworks and their applications :
Author: Chee Keong Ng, Lei Pan, Yang Xiang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software)-- Prevention.,Computer modelling & simulation.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Mathematical physics.,Maths for computer scientists.
Classification :
QA76
.
9
.
A25


118. Honeypots
Author: / Lance Spitzner
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
,
S67
2003


119. Honeypots :
Author: R.C. Joshi, Anjali Sardana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Firewalls (Computer security),Hackers,Wireless communication systems-- Security measures
Classification :
QA76
.
9
.
A25


120. Honeypots
Author: / Lance Spitzner
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
,
S67
2003

