121. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011


122. InfoSec career hacking :
Author: Aaron W. Bayles et al ; forward by Christopher W. Klaus.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B39
2005eb


123. Information security a manager's guide to thwarting data thieves and hackers
Author: / Philip Alexander
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection
Classification :
HF5548
.
37
.
A44
2008


124. Insider threat :
Author: Eric Cole, Sandra Ring
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Commercial crimes,Computer networks-- Security measures,Computer security,Hackers

125. Insider threat
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Commercial crimes. ; Computer hackers. ; Computer networks ; Security measures. ; Computer security. ;

126. Insider threat
Author: / Eric Cole, Sandra Ring
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

127. Intelligent security systems
Author: /Leon Reznik
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Artificial intelligence,Machine learning,a03,a05,a05
Classification :
QA76
.
9
.
A25
2022


128. Internet security: Hacking, counterhacking, and society
Author: / Kenneth Einar Himma
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Internet,Computer security,Computer hackers,-- Security measures,-- Moral and ethical aspects
Classification :
005
.
8
I61
2007


129. Joe Grand's "best of" hardware, wireless & game console hacking :
Author: Joe Grand [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer games-- Programming.,Hackers.,Video games-- Design.,Wireless communication systems.,Computer games-- Programming.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.,Video games-- Design.,Wireless communication systems.
Classification :
QA76
.
9
.
A25
J64
2006eb


130. Joomla! web security :
Author: Tom Canavan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Joomla! (Computer file),Joomla! (Computer file),Joomla! (Computer file),Computer networks-- Security measures.,Web site development.,Web sites-- Authoring programs.,Web sites-- Security measures.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Web site development.,Web site development.,Web sites-- Authoring programs.,Web sites-- Authoring programs.,Web sites-- Security measures.,Web sites-- Security measures.
Classification :
TK5105
.
59
.
C36
2008


131. LAN switch securit
Author: / Eric Vyncke and Christopher Paggen
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Local area networks (Computer networks)--Security measures,Telecommunication--Switching systems--Security measures
Classification :
TK
,
5105
.
7
,.
V96
,
2007


132. LAN switch security
Author: / Eric Vyncke and Christopher Paggen
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Local area networks (Computer networks)- Security measures,Telecommunication- Switching systems- Security measures
Classification :
E-BOOK

133. LAN switch security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Local area networks (Computer networks) ; Security measures ; Telecommunication ; Switching systems ; Security measures ;

134. LAN switch security
Author: / Eric Vyncke and Christopher Paggen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Local area networks (Computer networks)- Security measures,Telecommunication- Switching systems- Security measures
Classification :
TK5105
.
7
.
V96
2008


135. LAN switch security :
Author: / Eric Vyncke and Christopher Paggen
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Local area networks (Computer networks) , Security measures,Telecommunication , Switching systems , Security measures
Classification :
E-BOOK

136. LAN switch security : what hackers know about your switches
Author: Vyncke, Eric.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Local area networks )Computer networks(,Switching systems Security measures ، Telecommunication
Classification :
TK
5105
.
7
.
V96
2008


137. Learn Ethical Hacking from Scratch :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)
Classification :
TK5105
.
59
.
S33
2018


138. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

139. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

140. Linux basics for hackers :
Author: by OccupyTheWeb.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Hackers.,Operating systems (Computers),Penetration testing (Computer security),Hackers.,Kali Linux,Operating systems (Computers),Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
O325
2019

