• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۶۹۴ پاسخ غیر تکراری از ۷۱۱ پاسخ تکراری در مدت زمان ۰,۳۷ ثانیه یافت شد.

541. <The> Basics of Web Hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Josh Pauli ; Scott White, technical editor

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاه‌ها -- تدابیر ایمنی,برنامه‌های کاربردی وب -- تدابیر ایمنی,شبکه‌های کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمن‌سازی کامپیوتر)

Classification :
TK5105
.
59
.
P38B3
2013

542. The Best of 2600

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.

Classification :
QA76
.
9
.
A25
G643
2009

543. <The> Law and economics of cybersecurity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Library of Faculty of Literature and Humanities Sciences of Kashan University (Esfahan)

Subject: Computer crimes,Computer security- Law and legislation- Economic aspects,Online information services- Law and legislation

Classification :
364
.
168
L415

544. The Snowden files :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Luke Harding.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Snowden, Edward J.,1983-,Snowden, Edward J.,Snowden, Edward J., 1983-,Snowden, Edward J.,1983-,Snowden, Edward J.,1983-,United States.,United States.,United States.,Umschulungswerkstätten für Siedler und Auswanderer, Bitterfeld,United States.,Computer crimes-- United States.,Domestic intelligence-- United States.,Electronic surveillance-- United States.,Leaks (Disclosure of information)-- United States.,Whistle blowing-- United States.,American espionage.,BIOGRAPHY & AUTOBIOGRAPHY-- Political.,Computer crimes-- United States.,Computer crimes.,Databrott.,Domestic intelligence-- United States.,Domestic intelligence.,Electronic surveillance-- United States.,Electronic surveillance-- United States.,Electronic surveillance.,Elektronisk övervakning.,Geheimdienst,Läckor (avslöjande av information),Leaks (Disclosure of information),Leaks (Disclosure of information)-- United States.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,TRUE CRIME-- Espionage.,Whistle blowing-- United States.,Whistle blowing.,Whistle-blowing.,United States., 7

Classification :
JF1525
.
W45
H37
2014

545. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

546. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

547. The basics of hacking and penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Patrick Engebretson

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
2013

548. The basics of hacking and penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Patrick Engebretson ; technical editor, James Broad.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

Classification :

549. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli ; Scott White, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

Classification :

550. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures

Classification :
TK5105
.
59
.
P385
2013

551. The best of 2600 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Emmanuel Goldstein.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.

Classification :
QA76
.
9
.
A25
G643
2008

552. The cuckoo's egg :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Cliff Stoll.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Hess, Markus.,Stoll, Clifford.,Stoll, Clifford.,Computer crimes-- Germany-- Hannover.,Computer crimes-- United States.,Defense information, Classified-- United States-- Databases.,Espionage, Soviet-- Germany-- Hannover.,Espionage, Soviet-- United States.,Computer crimes.,Espionage, Soviet.,Germany, Hannover.,United States., 7, 7

Classification :
UB271
.
R92
H477
2000

553. The death of the internet

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Markus Jakobsson

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures

Classification :
TK5105
.
875
.
I57
.
J34
2012

554. The fugitive game

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jonathan Littman

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Mitnick, Kevin D.--(Kevin David),--1963,Computer crimes--United States--Investigation,Hackers--United States--Psychology,Internet--Security measures--United States

Classification :
HV
,
6773
.
2
,.
L57
,
1996

555. The hacker diaries

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Dan Verton

Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)

Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes

Classification :
QA76
.
9
.
A25V47
2002

556. The hacker playbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

Classification :

557. The hacker playbook 3 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
K56
2018

558. The hacker playbook 2 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

Classification :

559. The information systems security officer's guide :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dr. Gerald L. Kovaich

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security

Classification :

560. The information systems security officer's guide :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Gerald L. Kovacich.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Protection de l'information (Informatique),Sécurité informatique.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
K68
2003eb
  • »
  • 35
  • 34
  • 33
  • 32
  • 31
  • 30
  • 29
  • 28
  • 27
  • 26
  • 25
  • 24
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival