1. Hack Attacks Denied: A Complete Guide to Network Lock-Down
Author: / John Chirillo
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Computer Security,Computer networks-- Security measures
Classification :
005
.
8
C541h


2. Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks,...
Author: / John Chirillo
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Computer Security,Computer networks-- Security measures
Classification :
005
.
8
C541h
R


3. Hack Attacks Revealed
Author: \ John Chirillo.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Computer networks-- Security measures.
Classification :
QA
76
.
9
.
A25C46
2001
E-book
,


4. Hack Attacks Revealed: A Complete Reference With Custom Security Hacking Toolkit
Author: / John Chirillo
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Computer Security,Computer networks-- Security measures
Classification :
005
.
8
C541h


5. Hack attacks denied : a complete guide to network lockdown
Author: Chirillo, John, 0791-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25C445


6. Hack attacks denied: a complete guide to network lockdown
Author: Chirillo, John
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C47
2001


7. Hack attacks denied :a complete guide to network lockdown for UNIX, Windows, and Linux
Author: Chirillo, John
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25C47
2002


8. Hack attacks encyclopedia: a complete history of hacks cracks, Phreaks and spies over time
Author: / John Chirillo
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: کامپیوترها -- ایمنی اطلاعات,شبکههای کامپیوتری -- اقدامات تامینی
Classification :
QA
۷۶
/
۹
/
ال
ف
۹
چ
۹۴ ۱۳۸۰


9. Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time
Author: Chirillo, John
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25
C45
2001


10. Hack attacks encyclopedia: a complete history of hacks, cracks, phreaks, and spies over time
Author: Chirillo, John
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C54
2001


11. Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time
Author: Chirillo, John, 0791-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25C45


12. Hack attacks reveale
Author: / John Chirillo
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C48
,
2001b


13. #Hack attacks revealed
Author: #John Chirillo
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Computer hackers ،Computer networks- Security measures
Classification :
#
QA
،#.
A25
,
C475
،#
2002


14. Hack attacks revealed
Author: / John Chirillo
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
C48
2001


15. Hack attacks revealed : a complete reference with custom security hacking toolkit
Author: Chirillo, John, 0791-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25C46


16. Hack attacks revealed: a complete reference with custom security hacking toolkit
Author: Chirillo, John
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C48
2001


17. Hack attacks revealed: a complete reference with custom security hacking toolkit [electronic resource]
Author: / John Chirillo
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Computer networks--Security measures
Classification :
EB
,
QA76
.
9
.
A25
,
C48
2001

18. Hack attacks testing
Author: / John Chirillo
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer hackers
Classification :
QA76
.
9
.
A25
,
C49
2003


19. #Hack attacks testing
Author: #John Chirillo
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Computer hackers
Classification :
#
QA
،#.
A25
,
C49


20. Hack attacks testing how to conduct your own security audit
Author: / John Chirillo
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Computer security,Computer networks-security measures
Classification :
005
.
8
C542j

