1. Advanced penetration testing :
Author: Wil Allsopp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


2. Advanced penetration testing : hacking the world's most secure networks
Author: Wil Allsopp
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer networks -- Security measures
Classification :
TA
455
.
A43C425
2017


3. Applied Network Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.
Classification :
T55
.
4-60
.
8


4. Becoming the hacker :
Author: Adrian Pruteanu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


5. Beginning ethical hacking with Kali Linux :
Author: Sanjib Sinha.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hacking.,Penetration testing (Computer security),Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


6. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Electronic data processing personnel --Certification,Computer security --Examinations --Study guides,Computer hackers
Classification :
005
.
8
G776c


7. CEH v10 :
Author: Ric Messier.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS / Security / General.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25


8. Certified Ethical Hacker (CEH) preparation guide :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Examinations ; Study guides. ;

9. Computer security and penetration testing
Author: Basta, Alfred.
Library: Library of Niroo Research Institue (Tehran)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
B366
2008


10. Ethical hacking /
Author: Alana Maurushat.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Law and legislation, Case studies.,Computer security-- Law and legislation.,Computers-- Law and legislation, Case studies.,Computers-- Law and legislation.,Hackers-- Legal status, laws, etc.,Hackers-- Legal status, laws, etc., Case studies.,Hacking-- Moral and ethical aspects, Case studies.,Hacking-- Moral and ethical aspects.,Ordinateurs-- Droit, Études de cas.,Ordinateurs-- Droit.,Piratage informatique-- Aspect moral, Études de cas.,Piratage informatique-- Aspect moral.,Pirates informatiques-- Droit, Études de cas.,Pirates informatiques-- Droit.,Sécurité informatique-- Droit, Études de cas.,Sécurité informatique-- Droit.,Computer security-- Law and legislation.,Computers-- Law and legislation.,Hacking.
Classification :
HV6773
.
M383
2019


11. Ethical hacking and countermeasures /
Author: EC-Council Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.
Classification :
QA76
.
9
.
A25
E865
2010


12. From hacking to report writing :
Author: Robert Svensson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
QA76
.
9
.
A25


13. Google hacking for penetration testers
Author: Long, Johnny.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Google,، Web search engines,، Penetration testing )Computer security(,، Computer security,، Internet programming,Security measures ، Internet,Security measures ، Computer networks
Classification :
TK
5105
.
885
.
G66
L66
2008


14. Gray hat hacking :
Author: Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Handbooks, manuals, etc.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer security.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


15. Hack I.T.
Author: / T.J. Klevinsky, Scott Laliberte, and Ajay Gupta
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computers--Access control--Testing
Classification :
QA
,
76
.
9
,.
A25
,
K56
,
2002


16. Hacking /
Author: by Kevin Beaver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Hackers.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B42
2018


17. Hacking and penetration testing with low power devices /
Author: Philip Polstra, associate professor, Bloomsburg University, Bloomsburg, PA ; technical editor, Vivek Ramachandran
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: BeagleBone (Computer),Penetration testing (Computer security)-- Equipment and supplies
Classification :
QA76
.
9
.
A25
P5965
2015


18. Hacking with Kali
Author: James Broad, Andrew Bindner
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
.
B763
2014


19. Hands-on penetration testing with Python :
Author: Furqan Khan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Penetration testing (Computer security),Python (Computer program language),Penetration testing (Computer security),Python (Computer program language)
Classification :
QA76
.
73
.
P98


20. Learn Ethical Hacking from Scratch :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)
Classification :
TK5105
.
59
.
S33
2018

