21. Berek & Hacker's gynecologic oncology
Author: [edited by]& Jonathan S. Berek, Neville F. Hacker; illustrations and design by Tim Hengst, George Barile, Deborah Bereck
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Genital Neoplasms,Genitalia, Female, physiopathology
Classification :
WP
22. Berek & Hacker's gynecologic oncology
Author:
Library: Central Library of Kashan University of Medical Sciences (Esfahan)
Subject: Genital Neoplasms, Female,Genitalia, Female- physiopathology
23. Berek and Hacker's gynecologic oncology
Author:
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Genital Neoplasms, Female,Genitalia, Female- physiopathology
24. Berek and Hacker's gynecologic oncology
Author:
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Genital Neoplasms, Female,Genitalia, Female- physiopathology
25. Browser Hacker's Handbook
Author: / Alcorn, Wade
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK
26. CEH Certified Ethical Hacker
Author: / Kimberly Graves
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Electronic data processing personnel - Certification,Computer security - Examinations - Study guides,Penetration testing (Computer security) - Examinations - Study guides,Computer hackers - Examinations - Study guides,Computer networks - Examinations - Study guides,داده پردازی - کارمندان - گواهینامه,کامپیوترها - ایمنی اطلاعات - آزمون ها - راهنمای مطالعه,آزمایش نفوذ (ایمنسازی کامپیوتر) - آزمون ها - راهنمای مطالعه,هکرها - آزمون ها- راهنمای مطالعه,شبکههای کامپیوتری - آزمون ها - راهنمای مطالعه
Classification :
QA76
,.
3
.
G6875
2010
27. CEH Certified Ethical Hacker Study Guide : Certified Ethical Hacker Study Guide
Author: / Graves, Kimberly
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ELECTRONIC&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|ENGINEERING, ELECTRICAL
Classification :
E-BOOK
28. CEH certified ethical hacker :
Author: Matt Walker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
W345
2016b
29. CEH certified ethical hacker: study guide
Author: / Kimberly Graves.,گریوز,Graves
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: دادهپردازی,کامپیوترها,آزمایش نفوذ ( ایمنسازی کامپیوتر),هکرها,شبکههای کامپیوتری, -- راهنمای مطالعه, -- راهنمای مطالعه, -- راهنمای مطالعه, -- راهنمای مطالعه, -- گواهی و گواهینامهها, -- آزمونها, -- آزمونها, -- آزمونها
Classification :
QA
۷۶
/
۳
/
گ
۴۳
س
۹ ۱۳۹۲
30. CEH certified ethical hacker study guide :
Author: Sean-Philip Oriyano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Hackers-- Certification,Penetration testing (Computer security)-- Examinations, Study guides
Classification :
QA76
.
9
.
A25
31. Certified Ethical Hacker (CEH) preparation guide :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Examinations ; Study guides. ;
32. Certified ethical hacker
Author: / Michael Gregg
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic data processing personnel- Certification,Computer security- Examinations Study guides,Computer hackers
Classification :
QA76
.
3
.
G743
2006
33. Dear Hacker
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Hackers. ;
34. Dear Hacker
Author: / Emmanuel Goldstein
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Hackers.
Classification :
QA
,
76
.
9
,.
A25
,
G644
,
2010
35. Dear Hacker : Letters to the Editor of 2600
Author: / Goldstein, Emmanuel
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK
36. Dear hacker: letters to the editor of 2600
Author: / Emmanuel Goldstein
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK
37. Defeating the hacker : a non-technical guide to computer security
Author: Schifreen, Robert
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security
Classification :
QA
76
.
9
.
A25S37
38. Die Hacker-Ethik und der Geist des Informations-Zeitalters
Author: Pekka Himanen; prolog von Linus Torvalds; epilog von Manuel Castells.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Delictes informàtics.,Pirates (Informàtica),Societat de la informació
39. "Education in Disguise": Culture of a Hacker and Maker Space
Author: Schrock, Andrew Richard,Schrock, Andrew Richard
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
40. Firewalls and Internet security: repelling the Wily Hacker
Author: Cheswick, William R.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Firewalls )Computer security(
Classification :
TK
5105
.
875
.
I57
C44
2003