21. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


22. The best of 2600 :
Author: Emmanuel Goldstein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2008


23. The hacker diaries
Author: / Dan Verton
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes
Classification :
QA76
.
9
.
A25V47
2002


24. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

25. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


26. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

27. Web Application Defender's Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B37
2013eb

