1. Biohackers :
Author: Alessandro Delfanti
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
HV6773
.
D45
2013


2. Chained exploits : advanced hacking attacks from start to finish
Author: Andrew Whitaker, Keatron Evans, Jack B. Voth
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computer hackers
Classification :
QA
76
.
9
.
A25W45


3. Code hacking :
Author: Richard Conway, Julian Cordingley
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
TK5105
.
59
.
C5795
2004


4. Dissecting the hack :
Author: Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberterrorism,Hackers,Hacking
Classification :
HV8079
.
C65


5. Enemy at the water cooler
Author: / Brian T. Contos
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Computer hackers,Electronic books. , lcsh
Classification :
E-BOOK

6. Enemy at the water cooler :
Author: Brian T. Contos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
TK5105
.
59
.
C658
2006


7. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


8. Hacker's underground handbook :
Author: David Melnichuk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Hackers.
Classification :
QA76
.
9
.
A25
D385
2010


9. Hacker techniques, tools, and incident handling
Author: Oryano, Sean-Philip
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Computers hackers
Classification :
QA
76
.
9
.
A25H3


10. Hacking
Author: Pankaj, S.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,، Computer hackers,، Computer networks--Security measures,، Internet--Security measures
Classification :
QA
76
.
9
.
A25
P35
2005


11. Hacking /
Author: by Kevin Beaver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Hackers.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B42
2018


12. Hacking for dummie
Author: / by Kevin Beaver
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer hackers.,Computer networks--Security measures,Computer security.
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2007


13. Hacking for dummies
Author: / by Kevin Beaver
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Hackers.
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2010


14. Hacking for dummies
Author: / by Kevin Beaver
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer hackers.
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2004


15. Hacking for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Hackers. ;

16. Hacking for dummies
Author: by Kevin Beaver
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Computer networks- Security measures,Computer hackers
Classification :
QA
,
76
.
9
,.
A25
,
B42
,
2004


17. Hacking for dummies
Author: Beaver, Kevin.
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,Security measures ، Computer networks,، Hackers
Classification :
QA
76
.
9
.
A25
B42
2010


18. Hacking for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Computer networks ; Security measures ; Hackers ;

19. Hacking tools & techniques and incident handling
Author: / Nem Pal Singh ...[et al.]
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25
H3
2003


20. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011

