1. Absent mother god of the west: a Kali lover's journey into Christianity and Judaism
Author: Saxena, Neela Bhattacharya
Library: Special Library of University of Religions (Qom)
Subject: ، Femininity of God,Motherhood ، God,، Kali )Hindu deity(,، Christianity,، Judaism
Classification :
BL
215
.
5
.
S29
2016


2. British Asian theatre: dramaturgy, process and performance
Author: Hingorani, Dominic
Library: Special Library of University of Religions (Qom)
Subject: ، Tara Arts Group,، Tamasha )Theatre company(,، Kali Theatre Company,History ، Theater, South Asian -- Great Britain -- 02th century,South Asian authors History and criticism ، English drama,History and criticism ، English drama -- 02th century
Classification :
PN
2593
.
13
.
S68
.
H56
2010


3. Encountering Kālī ;
Author: edited by Rachel Fell McDermott and Jeffrey J. Kripal
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kālī (Hindu deity)
Classification :
BL1225
.
K3
E62
2003


4. Hands-on AWS penetration testing with Kali Linux :
Author: Karl Gilbert, Benjamin Caudill.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Amazon Web Services (Firm),Amazon Web Services (Firm),Kali Linux.,Kali Linux.,Cloud computing.,Computer networks-- Security measures.,Penetration testing (Computer security),Cloud computing.,Computer networks-- Security measures.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


5. Hands-on penetration testing on Windows :
Author: Phil Bramwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Microsoft Windows (Computer file),Kali Linux.,Microsoft Windows (Computer file),Computer security.,Computers-- Access control.,Penetration testing (Computer security),Windows PowerShell (Computer program language),Computer security.,Computers-- Access control.,Penetration testing (Computer security),Windows PowerShell (Computer program language)
Classification :
QA76
.
9
.
A25


6. Hymn to Kali (Karpuradi-stotra).
Author: [Edited] by Arthur Avalon (Sir John Woodroffe). With introd. and commentary by Vimalananda-Svami
Library: Library of Faculty Literature of University of Tehran (Tehran)
Subject: Kali (Hindu deity)--Poetry.,Hindu hymns, Sanskrit.

7. Kali Linux Cookbook - Second Edition.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
.
S385
2017eb


8. Learn Ethical Hacking from Scratch :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)
Classification :
TK5105
.
59
.
S33
2018


9. Learn Kali Linux 2019 :
Author: Glen D. Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Application software-- Testing.,Computer networks-- Security measures.,Penetration testing (Computer security),Application software-- Testing.,Computer networks-- Security measures.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


10. Learn Social Engineering :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Penetration testing (Computer security),Social engineering.,Computer networks-- Security measures.,Computer security.,Computers-- Internet-- Security.,Computers-- Networking-- Security.,Computers-- Security-- General.,Network security.,Penetration testing (Computer security),Privacy & data protection.,Social engineering.
Classification :
TK5105
.
59
.
O953
2018eb


11. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

12. Linux basics for hackers :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Kali Linux. ; Hackers. ; Operating systems (Computers) ;

13. Linux basics for hackers :
Author: by OccupyTheWeb.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Hackers.,Operating systems (Computers),Penetration testing (Computer security),Hackers.,Kali Linux,Operating systems (Computers),Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
O325
2019


14. Mother of my heart, daughter of my dreams: Kali and Uma in the devotional poetry of Bengal
Author: McDermott, Rachel Fell
Library: Special Library of University of Religions (Qom)
Subject: Translations into English ، Devotional poetry, Bengali,Poetry ، Kali )Hindu deity(,Poetry ، Uma )Hindu deity(
Classification :
PK
1714
.
5
.
E5
.
M33
2000


15. Myth, cult and symbols in Sakta Hinduism: a study of the Indian mother goddess
Author: Beane, Wendell Charles
Library: Special Library of University of Religions (Qom)
Subject: ، Shaktism,، Kali )Hindu deity(
Classification :
BL
1245
.
S42
.
B42


16. Offering flowers, feeding skulls :
Author: June McDaniel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kālī-- Cult-- India-- West Bengal.,Kālī,Shaktism-- India-- West Bengal.,Cults.,RELIGION-- Hinduism-- General.,Shaktism.,West Bengal (India), Religious life and customs.,India, West Bengal., 0, 7
Classification :
BL1225
.
K33
W36
2004eb


17. Offering flowers, feeding skulls: popular goddess worship in West Bengal
Author: McDaniel, June
Library: Special Library of University of Religions (Qom)
Subject: Cult ، Kali )Hindu deity( -- India West Bengal,، Shaktism -- India West Bengal,Religious life and customs ، West Bengal )India(
Classification :
BL
1225
.
K33
.
W36
2004


18. Penetration testing bootcamp :
Author: Jason Beltrame.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Application software-- Testing.,Computer networks-- Security measures.,Penetration testing (Computer security),Raspberry Pi (Computer),Application software-- Testing.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Penetration testing (Computer security),Raspberry Pi (Computer)
Classification :
TK5105
.
59


19. Penetration testing with Raspberry Pi :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Penetration testing (Computer security),Raspberry Pi (Computer),COMPUTERS-- Hardware-- General.,COMPUTERS-- Microprocessors.,COMPUTERS-- Security-- Networking.,Penetration testing (Computer security),Raspberry Pi (Computer)
Classification :
QA76
.
9
.
A25
M37
2016eb


20. Revelry, rivalry, and longing for the goddesses of Bengal :
Author: Rachel Fell McDermott.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Durgā-pūjā (Hindu festival)-- India-- West Bengal.,Jagaddhātrī-pūjā (Hindu festival)-- India-- West Bengal.,Kālī-pūjā (Hindu festival)-- India-- West Bengal.,Durgā-pūjā (Hindu festival),Jagaddhātrī-pūjā (Hindu festival),Kālī-pūjā (Hindu festival),RELIGION-- Comparative Religion.,RELIGION-- Hinduism-- Rituals & Practice.,West Bengal (India), Religious life and customs.,India, West Bengal., 0, 7
Classification :
BL1239
.
82
.
D87
M33
2011eb

