• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۲۷ پاسخ غیر تکراری از ۲۷ پاسخ تکراری در مدت زمان ۰,۸۱ ثانیه یافت شد.

21. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures

Classification :
TK5105
.
59
.
P385
2013

22. The best of 2600 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Emmanuel Goldstein.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.

Classification :
QA76
.
9
.
A25
G643
2008

23. The hacker diaries

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Dan Verton

Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)

Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes

Classification :
QA76
.
9
.
A25V47
2002

24. The hacker playbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

Classification :

25. The hacker playbook 3 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
K56
2018

26. The hacker playbook 2 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

Classification :

27. Web Application Defender's Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.

Classification :
QA76
.
9
.
A25
B37
2013eb
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival