1. Android hacker's handbook /
Author: Joshua J. Drake [and five others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Android (Electronic resource),Application software-- Development.,Computer security.,Hackers.,Mobile computing.

2. Becoming an ethical hacker
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Handbooks, manuals, etc. ; Computer security ; Handbooks, manuals, etc. ; Hackers. ; Computer security. ; fast ; (

3. Biohackers :
Author: Alessandro Delfanti
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
HV6773
.
D45
2013


4. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic data processing personnel--Certification,Computer security--Examinations--Study guides,Hackers--Examinations--Study guides,Computer networks--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
G69
,
2007


5. CEH :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing personnel ; Certification. ; Computer security ; Examinations ; Study guides. ; Computer hackers. ; Hackers. ; fast ; (OCoLC)fst00872150 ; Computer security ; Examinations. ; fast ; (OCoLC)fst00872489 ; Electronic data processin

6. CEH
Author: / Kimberly Graves
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Electronic data processing personnel --Certification,Computer security --Examinations --Study guides,Computer hackers
Classification :
005
.
8
G776c


7. CEH
پدیدآورنده : Kimberly Graves
موضوع : Electronic data processing personnel- Certification,Computer security- Examinations- Study guides,Computer hackers
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
8. Certified ethical hacker
Author: / Michael Gregg
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic data processing personnel- Certification,Computer security- Examinations Study guides,Computer hackers
Classification :
QA76
.
3
.
G743
2006


9. Chained exploits : advanced hacking attacks from start to finish
Author: Andrew Whitaker, Keatron Evans, Jack B. Voth
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computer hackers
Classification :
QA
76
.
9
.
A25W45


10. Code hacking :
Author: Richard Conway, Julian Cordingley
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
TK5105
.
59
.
C5795
2004


11. CompTIA PenTest+ Study Guide :
Author: Mike Chapple, David Seidl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Examinations.,Computer security-- Examinations.
Classification :
QA76
.
9
.
A25
C43
2019


12. Computer forensics :
Author: EC-Council Press
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer hackers,Computer security-- Examinations, Study guides,Criminal investigation-- Examinations, Study guides,Electronic evidence
Classification :
HV8079
.
C65
C664
2010


13. CyberShock
Author: / by Winn Schwartau
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer crimes
Classification :
QA
76
.
9
A25
S3537
2000


14. Cyberpunk :
Author: Katie Hafner and John Markoff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
H34
1991


15. Dear Hacker
Author: / Emmanuel Goldstein
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Hackers.
Classification :
QA
,
76
.
9
,.
A25
,
G644
,
2010


16. Dear Hacker
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Hackers. ;

17. Dissecting the hack :
Author: Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberterrorism,Hackers,Hacking
Classification :
HV8079
.
C65


18. Enemy at the water cooler
Author: / Brian T. Contos
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Computer hackers,Electronic books. , lcsh
Classification :
E-BOOK

19. Enemy at the water cooler :
Author: Brian T. Contos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
TK5105
.
59
.
C658
2006


20. Ethical Hacking Official Course Material
Author: Mathew, Thomas
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security.,، Hackers.
Classification :
QA
76
.
9
.
M38
2003

