1. Computer forensics :
Author: EC-Council Press
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer hackers,Computer security-- Examinations, Study guides,Criminal investigation-- Examinations, Study guides,Electronic evidence
Classification :
HV8079
.
C65
C664
2010


2. CyberShock
Author: / by Winn Schwartau
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer crimes
Classification :
QA
76
.
9
A25
S3537
2000


3. Cyberpunk :
Author: Katie Hafner and John Markoff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
H34
1991


4. Dissecting the hack :
Author: Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberterrorism,Hackers,Hacking
Classification :
HV8079
.
C65


5. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


6. Insider threat :
Author: Eric Cole, Sandra Ring
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Commercial crimes,Computer networks-- Security measures,Computer security,Hackers

7. Insider threat
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Commercial crimes. ; Computer hackers. ; Computer networks ; Security measures. ; Computer security. ;

8. Insider threat
Author: / Eric Cole, Sandra Ring
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

9. Mafiaboy :
Author: Michael Calce and Craig Silverman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Calce, Michael.,Calce, Michael.,Calce, Michael.,Calce, Michael.,Computer crimes.,Computer security.,Hackers-- Canada, Biography.,Criminalité informatique.,Pirates informatiques-- Canada, Biographies.,Sécurité informatique.,Computer crimes.,Computer security.,Hackers.,Canada., 7
Classification :
HV6773
.
C34
2008


10. Ninja hacking :
Author: Thomas Wilhelm, Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Hackers.

11. Ninja hacking : unconventional penetration testing tactics and techniques
Author: Wilhelm, Thomas
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer security,Prevention ، Computer crimes,، Hackers
Classification :
QA
76
.
9
.
A25
W548
2011


12. Profiling hackers
Author: / Raoul Chiesa, Stefania Ducci, Silvio Ciappi
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.,Computer hackers.,Criminal behavior, Prediction of.
Classification :
HV
,
6773
,.
C477
,
2009


13. Stealing the networ
Author: / Raven Alder ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Fiction,Computer hackers--Fiction,Computer hackers--Psychology--Fiction,Computer security--Fiction,Identity theft--Fiction
Classification :
PS
,
648
,.
C65
,
S742
,
2005eb


14. Stealing the network
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Fiction. ; Computer hackers ; Fiction. ; Computer hackers ; Psychology ; Fiction. ; Computer security ; Fiction. ; Identity theft ; Fiction. ;

15. Stealing the network : how to own an identity
Author: Raven Alder... ]et al.[; Timothy Mullen )Thor(, contributing author and technical editor; Johnny Long, contributing author and technical editor
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Fiction ، Identity theft,Fiction ، Computer crimes,Fiction ، Computer hackers,Fiction ، Computer security,Psychology -- Fiction ، Computer hackers
Classification :
PS
648
.
C65S83


16. <The> Basics of Web Hacking
Author: \ Josh Pauli ; Scott White, technical editor
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاهها -- تدابیر ایمنی,برنامههای کاربردی وب -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمنسازی کامپیوتر)
Classification :
TK5105
.
59
.
P38B3
2013


17. The Best of 2600
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2009


18. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


19. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

20. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.
