121. The Best of 2600
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2009


122. The art of deception
Author: / Kevin D. Mitnick and William L. Simon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Information technology- Social aspects,Computer hackers
Classification :
QA76
.
9
.
A25
,
M585
2002


123. The art of deception
Author: / Kevin D. Mitnick and William L. Simon
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Information technology--Social aspects,Computer hackers
Classification :
EB
,
QA76
.
9
.
A25M58
2002

124. The art of deception: controlling the human element of security
Author: Mitnick, Kevin D.)Kevin David(
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,Social aspects ، Information technology,، Computer hackers
Classification :
QA
76
.
9
.
A25
M585
2002


125. The art of intrusion :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Hackers ;

126. The art of intrusion
Author: / Kevin D. Mitnick, William L. Simon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer hackers.
Classification :
QA
,
76
.
9
,.
A25
,
M587
,
2005


127. The art of intrusion :the real stories behind the exploits of hackers, intruders, & deceivers
Author: / Kevin D. Mitnick, William L. Simon
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Hackers
Classification :
QA76
.
9
.
A2M5


128. The art of intrusion: the real stories behind the exploits of hackers, intruders, & deceivers
Author: Mitnick, Kevin D. )Kevin David(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computer hackers
Classification :
QA
76
.
9
.
A25
.
M587
2005


129. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


130. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

131. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

132. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


133. The best of 2600 :
Author: Emmanuel Goldstein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2008


134. The hacker diaries
Author: / Dan Verton
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes
Classification :
QA76
.
9
.
A25V47
2002


135. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

136. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


137. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

138. The hacker's handboo
Author: / Susan Young, Dave Aitel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.
Classification :
TK
,
5105
.
59
,.
Y68
,
2004


139. The hacker's handbook: the strategy behind breaking into and defending networks
Author: Young, Susan )Susan Elizabeth(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers
Classification :
TK
5105
.
59
.
Y68
2004


140. The unofficial guide to ethical hacking
Author: Fadia, Ankit
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Hackers
Classification :
76
.
9
.
A25
F33
