61. Hacking for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Computer networks ; Security measures ; Hackers ;

62. Hacking the future :
Author: Cole Stryker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming-- Moral and ethical aspects.,Computer security.,Hackers.,Hacktivism.,Identity (Psychology),Internet-- Security measures.,Internet.,Online identities.,Privacy.,Computer programming-- Moral and ethical aspects.,Computer security.,Hackers.,Hacktivism.,Identity (Psychology),Internet-- Security measures.,Internet.,Online identities.,Privacy.
Classification :
QA76
.
9
.
M65
S87
2012


63. Hacking the xbox :
Author: Andrew "Bunnie" Huang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Reverse engineering.

64. Hacking tools & techniques and incident handling
Author: / Nem Pal Singh ...[et al.]
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25
H3
2003


65. Hacking tools & techniques and incident handling
Author:
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Computer hackers
Classification :
QA
76
.
9
.
A25
H34
2004


66. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011


67. Honeypots
Author: / Lance Spitzner
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
,
S67
2003


68. Honeypots :
Author: R.C. Joshi, Anjali Sardana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Firewalls (Computer security),Hackers,Wireless communication systems-- Security measures
Classification :
QA76
.
9
.
A25


69. Honeypots
Author: / Lance Spitzner
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
,
S67
2003


70. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011


71. InfoSec career hacking :
Author: Aaron W. Bayles et al ; forward by Christopher W. Klaus.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B39
2005eb


72. Insider threat :
Author: Eric Cole, Sandra Ring
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Commercial crimes,Computer networks-- Security measures,Computer security,Hackers

73. Insider threat
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Commercial crimes. ; Computer hackers. ; Computer networks ; Security measures. ; Computer security. ;

74. Insider threat
Author: / Eric Cole, Sandra Ring
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

75. Internet security: Hacking, counterhacking, and society
Author: / Kenneth Einar Himma
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Internet,Computer security,Computer hackers,-- Security measures,-- Moral and ethical aspects
Classification :
005
.
8
I61
2007


76. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

77. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

78. Linux basics for hackers :
Author: by OccupyTheWeb.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Hackers.,Operating systems (Computers),Penetration testing (Computer security),Hackers.,Kali Linux,Operating systems (Computers),Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
O325
2019


79. Low tech hacking :
Author: Jack Wiles [and others]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Hackers
Classification :
QA76
.
9
.
A25
L68
2012


80. Mafiaboy :
Author: Michael Calce and Craig Silverman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Calce, Michael.,Calce, Michael.,Calce, Michael.,Calce, Michael.,Computer crimes.,Computer security.,Hackers-- Canada, Biography.,Criminalité informatique.,Pirates informatiques-- Canada, Biographies.,Sécurité informatique.,Computer crimes.,Computer security.,Hackers.,Canada., 7
Classification :
HV6773
.
C34
2008

