امنیت اطلاعات و تضمین: کنفرانس بین المللی عیسی 2011، بر ...
Information Security and Assurance: International Confe ......
آموزش کار با نرم افزار Nmap
Hacking Exposed, 6th Edition
Practical Intrusion Analysis
ابراهیم اپستین: پدر فراموش شده از تامین اجتماعی
Abraham Epstein: The Forgotten Father of Social Securit ...
Security Monitoring
The Myths of Security
جریان Bioelectromagnetics مفاهیم: مکانیسم اثر بیولوژیکی ...
Bioelectromagnetics Current Concepts: The Mechanisms of ......
Hacking VoIP
آشنایی با ریاضی رمزنگاری (متون کارشناسی ریاضی)
An Introduction to Mathematical Cryptography (Undergrad ...
Hacking, 2nd Edition
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Frag ...
تحلیل کاربردی بدافزار
Practical Malware Analysis
تحلیل بدافزار یک تجارت بزرگ بهشمار میآید چراکه حملههای آنها میتوانند باعث تحمیل هزینههای سنگینی برای یک شرکت شوند. وقتی بدافزاری در استحکامات شما ...
Hacking Exposed Computer Forens ...
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, ...
امنیت اطلاعات و تضمین: کنفرانس بی ...
Information Security and Assura ...
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 20 ...
Hacking Exposed Malware and Roo ...
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You wi ...
CompTIA Security+: Get Certifie ...
The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 study guides, which have helped ...
آموزش کار با نرم افزار Nmap
فایروالهایی مورد استفاده قرار گرفته و چندین پارامتر دیگر Nmap بر روی اکثر رایانه ها، هم گرافیکی و هم کنسول ها قابل استفاده است. Nmap یک نرمافزار مج ...
Mastering Bitcoin, 2nd Edition
Join the technological revolution that’s taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of ...
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following t ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
آموزش جلوگیری از حملات XSS و CSS
برچسب ها : . XSS CSS, اکسپلویت نویسی, پارس هکرز, کتاب هک فارسی, نحوه پیدا کردن باگ
ابراهیم اپستین: پدر فراموش شده از ...
Abraham Epstein: The Forgotten ...
Social Security has long been called the third rail of American politics—an unassailable institution for which we can thank Franklin Delano Roosevelt ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Hacking Exposed Linux, 3rd Edit ...
This authoritative guide will help you secure your Linux network – whether you use Linux as a desktop OS, for Internet services, for telecommunication ...
جریان Bioelectromagnetics مفاهیم: ...
Bioelectromagnetics Current Con ...
This volume is based on the lectures and selected posters on different aspects of biological effects of EMF, presented at the NATO Advanced Research W ...
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet a ...
نقاط آسیب پذیر لینوکس و یونیکس
اکثر کرم ها و سایر حملات موفقیت آمیز در اینترنت ، بدلیل وجود نقاط آسیب پذیر در تعدادی اندک از ویرویس های سیستم های عامل متداول است . مهاجمان ، با فرصت ...
آشنایی با ریاضی رمزنگاری (متون کا ...
An Introduction to Mathematical ...
This is a fantastic book. The writing is simple and clear. Even if I skipped class for a week, I could sit down and read this book, confident I would ...
Hacking, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl ...