• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۰۷ پاسخ غیر تکراری از ۱۰۷ پاسخ تکراری در مدت زمان ۰,۸۹ ثانیه یافت شد.

61. Professional penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thomas Wilhelm, Matthew Neely, technical editor

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer hackers,Computer networks-- Security measures,Computer networks-- Testing,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
W544
2013

62. Professional penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Thomas Wilhelm.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.

Classification :
QA76
.
9
.
W55
2010eb

63. Protocol :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Alexander R. Galloway.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.

Classification :
TK5105
.
59
.
G35
2004

64. Secure Internet practices :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Patrick McBride [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.,Gestion-- Informatique-- Sécurité-- Mesures.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.

Classification :
TK5105
.
59
.
S435
2002

65. Solving Cyber Risk :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.

Classification :
QA76
.
9
.
A25
C577
2018

66. Spring Security 3.1

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Robert Winch, Peter Mularien

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Malware (Computer software)-- Prevention,Web sites-- Design,Web sites-- Security measures

Classification :
TK5105
.
59
.
W563
2012

67. <The> Basics of Web Hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Josh Pauli ; Scott White, technical editor

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاه‌ها -- تدابیر ایمنی,برنامه‌های کاربردی وب -- تدابیر ایمنی,شبکه‌های کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمن‌سازی کامپیوتر)

Classification :
TK5105
.
59
.
P38B3
2013

68. The Browser Hacker's Handbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wade Alcorn, Christian Frichot, Michele Orrù.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.

Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014

69. The CEH prep guide :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ronald L. Krutz, Russell Dean Vines.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.

Classification :
QA76
.
9
.
A25
K79
2007eb

70. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli ; Scott White, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

Classification :

71. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures

Classification :
TK5105
.
59
.
P385
2013

72. The hacker playbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

Classification :

73. The hacker playbook 3 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
K56
2018

74. The hacker playbook 2 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

Classification :

75. The hacker's handboo

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Susan Young, Dave Aitel

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.

Classification :
TK
,
5105
.
59
,.
Y68
,
2004

76. The hacker's handbook: the strategy behind breaking into and defending networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Young, Susan )Susan Elizabeth(

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers

Classification :
TK
5105
.
59
.
Y68
2004

77. Tribe of Hackers :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Marcus J. Carey & Jennifer Jin.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.

Classification :
HF5548
.
37
C37
2019eb

78. Tribe of hackers :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Marcus J, Carey and Jennifer Jin.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.

Classification :

79. Violent Python

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: TJ. O'Connor

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Python (Computer program language)

Classification :
QA76
.
73
.
P98
O26
2013

80. Web Application Defender's Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.

Classification :
QA76
.
9
.
A25
B37
2013eb
  • »
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival