پیشرفت در امنیت و روش های پرداخت برای موبایل بازرگانی
Advances in Security and Payment Methods for Mobile Com ...
Network Forensics
Penetration Testing
The InfoSec Handbook
آشنایی با Hash و انواع آن
ایمنی و امنیت تجاری بودن سوخت هسته ای ذخیره سازی: گزارش ...
Safety and Security of Commercial Spent Nuclear Fuel St ......
Bitcoin Essentials
Bitcoin for the Befuddled
Hacking, 2nd Edition
ویروس کامپیوتر
نکته های امنیتی در Asp.Net
آشنایی کلاسیک رمزنگاری - برنامه ه ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security b ...
پیشرفت در امنیت و روش های پرداخت ...
Advances in Security and Paymen ...
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subje ...
امنیت بیسیم
Wireless Security: Know It All
شبکههای بیسیم به شدت در مقابل حملات آسیبپذیر هستند و امروزه حفظ ایمنی در برابر حملات، از چالشهای توسعهی این شبکههاست. ساختار این شبکهها مبتنی ب ...
Network Forensics
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional ...
Big Data Forensics – Learning H ...
Big Data forensics is an important type of digital investigation that involves the identification, collection, and analysis of large-scale Big Data sy ...
Network Attacks and Defenses: A ...
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attac ...
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...
Kali Linux Network Scanning Coo ...
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of ne ...
Learning Nessus for Penetration ...
IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...
Penetration Testing
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts ...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field an ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Hacking Exposed Computer Forens ...
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, ...
آشنایی با Hash و انواع آن
آشنایی با Hash و انواع آن هش کدها به طور خلاصه کدهایی هستند بر اساس الگوریتمهایی که با محاسبات بر روی فایل ها تولید می شوند. یعنی طبق یک سری الگوریتم ...
آشنایی کلاسیک رمزنگاری ورزش کتاب
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
ایمنی و امنیت تجاری بودن سوخت هست ...
Safety and Security of Commerci ...
In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study ...
Bitcoin Essentials
Blockchain is being billed as the technology of the future. Bitcoin is the first application of that technology. Mining is what makes it all possible. ...
Bitcoin for the Befuddled
Unless you’ve been living under a rock for the last couple of years, you’ve probably heard of Bitcoin-the game-changing digital currency used by milli ...
Hacking, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl ...
ویروس کامپیوتر
ویروس کامپیوتر بیش از سه دهه ازساخت اولین ویروس کامپیوتری توسط فرد کوهن می گذرد . شاید درابتدا کوهن هرگزتصورنمی کرد که روزی اختراع اوبه صورت یک فاجعه ...
مفاهیم پایه و معرفی ابزار کرک
آموزش کرک کردن, فاطمه هاشم زاده, قفل سخت افزاری, کپی رایت در ایران, کراک, کراکر, کراکینگ, کرک
نکته های امنیتی در Asp.Net
امروزه استفاده از صفحات Asp.net یکی از مهمترین کارهای برنامه نویسان وب است. ولی این صفحات دارای ضعف های فراوان میباشند. این کتاب ضعف های مذکور را در ق ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ...
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...