81. Mission-critical security planner
Author: / Eric Greenberg
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers
Classification :
QA76
.
9
.
A25
,
G745
2003


82. Mission-critical security planner :
Author: Eric Greenberg.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
G745
2003eb


83. Mission-critical security planner
Author: Eric Greenberg
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Computer hackers
Classification :
QA
,
76
.
9
,.
A25
,
G745
,
2003


84. Mission-critical security planner
Author: / Eric Greenberg
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers
Classification :
QA76
.
9
.
A25
,
G745
2003


85. Mission-critical security planner
Author: / Eric Greenberg
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Hackers.
Classification :
QA
,
76
.
9
,.
A25
,
G745
,
2003


86. Network intrusion alert: an ethical hacking guide to intrusion detection
Author: Fadia, Ankit
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Computer hackers
Classification :
QA
76
.
9
.
A25
F295
2008


87. Ninja hacking :
Author: Thomas Wilhelm, Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Hackers.

88. Ninja hacking : unconventional penetration testing tactics and techniques
Author: Wilhelm, Thomas
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer security,Prevention ، Computer crimes,، Hackers
Classification :
QA
76
.
9
.
A25
W548
2011


89. No tech hackin
Author: / Johnny Long
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer hackers.,Computer security.
Classification :
QA
,
76
.
9
,.
A25
,
L65
,
2008eb


90. No tech hacking
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Hackers. ; Computer security. ;

91. Penetration tester's open source toolkit
Author: Johnny Long...]et al.[; foreword by Max Moser
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Computer hackers,Access control ، Electronic information resources,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
P46
2006


92. Penetration testing :
Author: by Georgia Weidman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


93. Penetration testing :
Author: by Georgia Weidman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


94. Preventing good people from doing bad things :
Author: John Mutch, Brian Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Hackers.
Classification :
TK5105
.
59
.
M855
2011


95. Professional pen testing for Web applications
Author: / Andres Andreu
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Internet- Security measures,Computer hackers
Classification :
QA76
.
9
.
A25
,
A546
2006


96. Professional penetration testing
Author: Thomas Wilhelm, Matthew Neely, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer hackers,Computer networks-- Security measures,Computer networks-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
W544
2013


97. Professional penetration testing :
Author: by Thomas Wilhelm.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.
Classification :
QA76
.
9
.
W55
2010eb


98. Profiling hackers
Author: / Raoul Chiesa, Stefania Ducci, Silvio Ciappi
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.,Computer hackers.,Criminal behavior, Prediction of.
Classification :
HV
,
6773
,.
C477
,
2009


99. RTFM :
Author: Ben Clark.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Penetration testing (Computer security)

100. Social engineering :
Author: Christopher Hadnagy ; foreword by Steve "Woz" Wozniak.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Human-computer interaction.,Social engineering.,Computer security.,Hackers.,Human-computer interaction.,Social engineering.,SOCIAL SCIENCE-- Anthropology-- General.,SOCIAL SCIENCE-- Regional Studies.,SOCIAL SCIENCE-- Sociology-- General.
Classification :
HM668
.
H33
2018

