1. Becoming the hacker :
Author: Adrian Pruteanu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


2. Beginning ethical hacking with Kali Linux :
Author: Sanjib Sinha.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Hacking.,Penetration testing (Computer security),Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


3. Learn Ethical Hacking from Scratch :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)
Classification :
TK5105
.
59
.
S33
2018

