21. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011


22. Honeypots :
Author: R.C. Joshi, Anjali Sardana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Firewalls (Computer security),Hackers,Wireless communication systems-- Security measures
Classification :
QA76
.
9
.
A25


23. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011


24. Insider threat :
Author: Eric Cole, Sandra Ring
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Commercial crimes,Computer networks-- Security measures,Computer security,Hackers

25. Insider threat
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Commercial crimes. ; Computer hackers. ; Computer networks ; Security measures. ; Computer security. ;

26. Insider threat
Author: / Eric Cole, Sandra Ring
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

27. Penetration tester's open source toolkit
Author: Johnny Long...]et al.[; foreword by Max Moser
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Computer hackers,Access control ، Electronic information resources,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
P46
2006


28. Preventing good people from doing bad things :
Author: John Mutch, Brian Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Hackers.
Classification :
TK5105
.
59
.
M855
2011


29. Professional pen testing for Web applications
Author: / Andres Andreu
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Internet- Security measures,Computer hackers
Classification :
QA76
.
9
.
A25
,
A546
2006


30. Professional penetration testing
Author: Thomas Wilhelm, Matthew Neely, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer hackers,Computer networks-- Security measures,Computer networks-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
W544
2013


31. Professional penetration testing :
Author: by Thomas Wilhelm.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.
Classification :
QA76
.
9
.
W55
2010eb


32. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

33. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


34. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

35. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


36. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

37. The hacker's handboo
Author: / Susan Young, Dave Aitel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.
Classification :
TK
,
5105
.
59
,.
Y68
,
2004


38. The hacker's handbook: the strategy behind breaking into and defending networks
Author: Young, Susan )Susan Elizabeth(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers
Classification :
TK
5105
.
59
.
Y68
2004


39. Web Application Defender's Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B37
2013eb


40. Zero day exploit :
Author: Rob Shein ; Marcus H. Sachs, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Fiction.,Computer security, Fiction.,Hackers, Fiction.,Computer networks-- Security measures.,Computer security.,FICTION-- General.,Hackers.
Classification :
PS3619
.
H45
Z47
2004eb

