541. <The> Basics of Web Hacking
Author: \ Josh Pauli ; Scott White, technical editor
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاهها -- تدابیر ایمنی,برنامههای کاربردی وب -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمنسازی کامپیوتر)
Classification :
TK5105
.
59
.
P38B3
2013


542. The Best of 2600
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2009


543. <The> Law and economics of cybersecurity
Author:
Library: Library of Faculty of Literature and Humanities Sciences of Kashan University (Esfahan)
Subject: Computer crimes,Computer security- Law and legislation- Economic aspects,Online information services- Law and legislation
Classification :
364
.
168
L415


544. The Snowden files :
Author: Luke Harding.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Snowden, Edward J.,1983-,Snowden, Edward J.,Snowden, Edward J., 1983-,Snowden, Edward J.,1983-,Snowden, Edward J.,1983-,United States.,United States.,United States.,Umschulungswerkstätten für Siedler und Auswanderer, Bitterfeld,United States.,Computer crimes-- United States.,Domestic intelligence-- United States.,Electronic surveillance-- United States.,Leaks (Disclosure of information)-- United States.,Whistle blowing-- United States.,American espionage.,BIOGRAPHY & AUTOBIOGRAPHY-- Political.,Computer crimes-- United States.,Computer crimes.,Databrott.,Domestic intelligence-- United States.,Domestic intelligence.,Electronic surveillance-- United States.,Electronic surveillance-- United States.,Electronic surveillance.,Elektronisk övervakning.,Geheimdienst,Läckor (avslöjande av information),Leaks (Disclosure of information),Leaks (Disclosure of information)-- United States.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,TRUE CRIME-- Espionage.,Whistle blowing-- United States.,Whistle blowing.,Whistle-blowing.,United States., 7
Classification :
JF1525
.
W45
H37
2014


545. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

546. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

547. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


548. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

549. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

550. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


551. The best of 2600 :
Author: Emmanuel Goldstein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2008


552. The cuckoo's egg :
Author: Cliff Stoll.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hess, Markus.,Stoll, Clifford.,Stoll, Clifford.,Computer crimes-- Germany-- Hannover.,Computer crimes-- United States.,Defense information, Classified-- United States-- Databases.,Espionage, Soviet-- Germany-- Hannover.,Espionage, Soviet-- United States.,Computer crimes.,Espionage, Soviet.,Germany, Hannover.,United States., 7, 7
Classification :
UB271
.
R92
H477
2000


553. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012


554. The fugitive game
Author: / Jonathan Littman
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Mitnick, Kevin D.--(Kevin David),--1963,Computer crimes--United States--Investigation,Hackers--United States--Psychology,Internet--Security measures--United States
Classification :
HV
,
6773
.
2
,.
L57
,
1996


555. The hacker diaries
Author: / Dan Verton
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes
Classification :
QA76
.
9
.
A25V47
2002


556. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

557. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


558. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

559. The information systems security officer's guide :
Author: Dr. Gerald L. Kovaich
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security

560. The information systems security officer's guide :
Author: Gerald L. Kovacich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Protection de l'information (Informatique),Sécurité informatique.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
K68
2003eb

