161. Penetration testing :
Author: by Georgia Weidman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


162. Penetration testing :
Author: by Georgia Weidman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


163. Preventing good people from doing bad things :
Author: John Mutch, Brian Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Hackers.
Classification :
TK5105
.
59
.
M855
2011


164. Professional Red teaming :
Author: Jacob G. Oakley.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25


165. Professional pen testing for Web applications
Author: / Andres Andreu
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Internet- Security measures,Computer hackers
Classification :
QA76
.
9
.
A25
,
A546
2006


166. Professional penetration testing
Author: Thomas Wilhelm, Matthew Neely, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer hackers,Computer networks-- Security measures,Computer networks-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
W544
2013


167. Professional penetration testing :
Author: by Thomas Wilhelm.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.
Classification :
QA76
.
9
.
W55
2010eb


168. Profiling hackers
Author: / Raoul Chiesa, Stefania Ducci, Silvio Ciappi
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.,Computer hackers.,Criminal behavior, Prediction of.
Classification :
HV
,
6773
,.
C477
,
2009


169. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


170. RTFM :
Author: Ben Clark.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Penetration testing (Computer security)

171. Sandworm :
Author: Andy Greenberg.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Russia (Federation),Hackers-- Russia (Federation),Computer crimes.,Hackers.,SOCIAL SCIENCE / Sociology / General.,Russia (Federation), 7
Classification :
HV6773
.
R8
G74
2019


172. Secure Internet practices :
Author: Patrick McBride [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.,Gestion-- Informatique-- Sécurité-- Mesures.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.
Classification :
TK5105
.
59
.
S435
2002


173. Security for wireless implantable medical devices
Author: Xiali Hei, Xiaojiang Du
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Implants, Artificial,Medical instruments and apparatus,Wireless communication systems-- Security measures
Classification :
TK5103
.
2
.
H45
2013


174. Setting the Standard:
Author: Stanley, Jacob
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer engineering,Computer science,Information technology

175. Setting the Standard: An In-depth Analysis of the Growing Need Towards Regulated Security Standards for Embedded Software Devices Utilized in Military Networks
Author: Stanley, Jacob
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer engineering,Computer science,Information technology

176. Social engineering :
Author: Christopher Hadnagy ; foreword by Steve "Woz" Wozniak.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Human-computer interaction.,Social engineering.,Computer security.,Hackers.,Human-computer interaction.,Social engineering.,SOCIAL SCIENCE-- Anthropology-- General.,SOCIAL SCIENCE-- Regional Studies.,SOCIAL SCIENCE-- Sociology-- General.
Classification :
HM668
.
H33
2018


177. Social engineering: the art of human hacking
Author: Hadnagy, Christopher.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Social engineering,، Computer hackers,، Computer security,، Human-computer interaction
Classification :
HM
668
.
H34
2011


178. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


179. Spam :
Author: Finn Brunton.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Spam (Electronic mail)-- History.
Classification :
HE7553
.
B78
2013


180. Spies Among Us
Author: Ira Winkler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Technology.,Nonfiction.
