1. Advanced API Security :
Author: Prabath Siriwardena.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures.,Computer security.,Computers, Special purpose.,Data protection.,Programming languages (Electronic computers)
Classification :
QA75
.
5-76
.
95
2. BackTrack 5 cookbook
Author: Willie Pritchett, David de Smet.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Backtrack programming.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
P75
2012eb
3. BigNum mat
Author: / Tom St. Denis, Greg Rose
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Programming (Mathematics),Computer security.
Classification :
QA
,
402
.
5
,.
S114
,
2006eb
4. BigNum math :
Author: Tom St. Denis, Greg Rose
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Programming (Mathematics)
5. BigNum math
Author: / Tom St. Denis, Greg Rose
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Programming (Mathematics),Computer security,Electronic books. , lcsh
Classification :
E-BOOK
6. Data control guidelines
Author: Sharratt, J. R
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، computer programming managenet,، data editing,، electronic data processing department - Security measures
Classification :
QA
76
.
6
.
S513
7. Dynamic SQL :
Author: Edward Pollack.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming.,Computer security.,Database management.,Programming languages (Electronic computers),SQL (Computer program language),Computer programming.,Computer security.,COMPUTERS / Databases / Data Mining.,COMPUTERS / Databases / General.,COMPUTERS / Programming Languages / SQL.,Database management.,Programming languages (Electronic computers),SQL (Computer program language)
Classification :
QA76
.
73
.
S67
8. Engineering trustworthy software systems :
Author: Jonathan P. Bowen, Zhiming Liu, Zili Zhang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer software, Congresses.,Software engineering, Congresses.,Computer programming-- software development.,Computer security.,Computer software.,Computers-- General.,Computers-- Hardware-- Handheld Devices.,Computers-- Programming-- General.,Computers-- Programming Languages-- General.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Programming & scripting languages: general.,Software engineering.,Software Engineering.,Systems analysis & design.
Classification :
QA76
.
758
9. GlassFish security :
Author: Masoud Kalali.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet programming.,Java (Computer program language),Computer security.,Internet programming.,Java (Computer program language)
Classification :
QA76
.
9
.
A25
K35
2010eb
10. GlassFish security: secure your GlassFish installation, web applications, EJB applicatios, application client module, and web services using Java EE and GlassFish security measures
Author: Kalali, Masoud
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Java )Computer program language(,، Internet programming,، GlassFish )Computer file(
Classification :
QA
76
.
9
.
A25
K35
2010
11. Google hacking for penetration testers /
Author: Johnny Long, Bill Gardner, Justin Brown
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Google,Computer networks-- Security measures,Computer security,Internet programming,Internet-- Security measures,Web search engines
12. Google hacking for penetration testers
Author: Long, Johnny.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Google,، Web search engines,، Penetration testing )Computer security(,، Computer security,، Internet programming,Security measures ، Internet,Security measures ، Computer networks
Classification :
TK
5105
.
885
.
G66
L66
2008
13. Google hacking for penetration testers. Volume 2
Author: Long, Johnny
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Web search engines,، Computer security,، Internet programming,، Internet-- Security measures,، Computer networks-- Security measures
Classification :
TK
5105
.
885
.
G66
.
L66
2008
14. Google hacking for penetration testers.dollar5Volume 2 /
Author: Johnny Long.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Google.,Google.,Google.,Computer networks-- Security measures.,Computer security.,Internet programming.,Internet-- Security measures.,Web search engines.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Online Services.,COMPUTERS-- System Administration-- Storage & Retrieval.,Internet programming.,Internet-- Security measures.,Web search engines.
Classification :
TK5105
.
885
.
G66
L66
2008eb
15. Hacking cyberspace /
Author: David J. Gunkel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Hackers.,Systems programming (Computer science),Computer security.,Hackers.,Systems programming (Computer science)
Classification :
QA76
.
9
.
A25
G86
2001
16. Hacking mit Python :
Author: Justin Seitz. [Übers.: Peter Klicman].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet programming.,Python (Computer program language)
Classification :
QA76
.
9
.
A25
J878
2009
17. Hacking the future :
Author: Cole Stryker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming-- Moral and ethical aspects.,Computer security.,Hackers.,Hacktivism.,Identity (Psychology),Internet-- Security measures.,Internet.,Online identities.,Privacy.,Computer programming-- Moral and ethical aspects.,Computer security.,Hackers.,Hacktivism.,Identity (Psychology),Internet-- Security measures.,Internet.,Online identities.,Privacy.
Classification :
QA76
.
9
.
M65
S87
2012
18. Information hiding and application
Author: / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Digital watermarking.,Data protection.,Data encryption (Computer science),Genetic programming (Computer science)
Classification :
QA
,
76
.
9
,.
A25
,
I546
,
2009
19. Location privacy in mobile applications /
Author: Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Location-based services.,Mobile apps-- Security measures.,Computer security.,COMPUTERS-- Programming-- Mobile Devices.,Location-based services.,Mobile & handheld device programming-- Apps programming.,Privacy & data protection.
Classification :
QA76
.
59
20. Mac Security Bible.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Mac OS.,Mac OS.,Mac OS.,Computer networks-- Security measures.,Computer security.,Macintosh (Computer)-- Programming.,Operating systems (Computers),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Macintosh (Computer)-- Programming.,Operating systems (Computers)
Classification :
QA76
.
9