1. Becoming an ethical hacker
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Handbooks, manuals, etc. ; Computer security ; Handbooks, manuals, etc. ; Hackers. ; Computer security. ; fast ; (

2. Gray hat hacking :
Author: Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Handbooks, manuals, etc.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer security.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


3. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

4. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

5. Linux basics for hackers :
Author: by OccupyTheWeb.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Hackers.,Operating systems (Computers),Penetration testing (Computer security),Hackers.,Kali Linux,Operating systems (Computers),Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
O325
2019


6. Ninja hacking : unconventional penetration testing tactics and techniques
Author: Wilhelm, Thomas
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer security,Prevention ، Computer crimes,، Hackers
Classification :
QA
76
.
9
.
A25
W548
2011


7. Penetration testing :
Author: by Georgia Weidman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


8. Penetration testing :
Author: by Georgia Weidman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


9. Professional penetration testing
Author: Thomas Wilhelm, Matthew Neely, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer hackers,Computer networks-- Security measures,Computer networks-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
W544
2013


10. RTFM :
Author: Ben Clark.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Penetration testing (Computer security)

11. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


12. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

13. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

14. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


15. راهنمای جامع آزمون CEH v10 [ سی. ای. اچ. وی. ۱۰]
Author: / [ریک مسیر],عنوان اصلی: Ceh v10 Certified ethical hacker Study ,2019,عنوان روی جلد: راهنمای جامع آزمون CEH v۱۰. تشریح سرفصلهای آزمون CEH v۱۰، نمونه سوالات چند گزینه ای آزمون CEH v۱۰، چگونگی استفاده از ابزارهای تست نفوذ به همراه سناریوهای کاربردی ... ,مسیر,Messier
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: کامپیوترها,Computer security,آزمایش نفوذ ( ایمنسازی کامپیوتر),Penetration testing (Computer security),هکرها,Hackers, -- راهنمای مطالعه, -- Study guides, -- راهنمای مطالعه, -- Study guides, -- راهنمای مطالعه, -- Study guides, -- آزمونها, -- Examinations, -- آزمونها, -- Examinations,a01,a01,a02,a02,a03,a03
Classification :
QA
۷۶
/
۹
/
الف
۹
م
۵۶ ۱۳۹۹


16. راهنماي جامع كالي لينوكس : كتاب مرجع براي تست نفوذ
Author: الياسي، محمدعلي
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: كالي لينوكس ◄ Kali Linux ◄ آزمايش نفوذ ( ايمن سازي كامپيوتر) ◄ Penetration testing (Computer security) ◄ هكرها ◄ Hackers
Classification :
005
الف
754
ر
1402

