1. Exploiting software :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Computer software ; Testing ; Hackers ;

2. Exploiting software :
Author: Greg Hoglund, Gary McGraw
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computer software-- Testing,Hackers
Classification :
QA76
.
9
.
A25
H635
2004


3. Exploiting software
Author: / Greg Hoglund, Gary McGraw
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer software- Testing,Computer hackers
Classification :
QA76
.
9
.
A25
,
H635
2004


4. Exploiting software
Author: / Greg Hoglund, Gary McGraw
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer software- Testing,Computer hackers
Classification :
QA76
.
9
.
A25
,
H635
2004


5. Exploiting software
Author: / Greg Hoglund, Gary McGraw
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer software--Testing,Hackers.
Classification :
QA
,
76
.
9
,.
A25
,
H635
,
2004


6. Exploiting software. how to break code
Author: Hoglund, Greg.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer software- Testing,، Computer hackers
Classification :
QA
76
.
9
.
A25H635
2004


7. Exploiting software : how to break code
Author: / Greg Hoglund, Gary McGraw
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer software - Testing,Computer hackers
Classification :
QA76
.
9
.
A25H635
2004


8. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


9. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

10. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

11. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


12. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.
