نیروگاه هسته ای ابزار دقیق و کنترل سیستم های ایمنی و ام ...
Nuclear Power Plant Instrumentation and Control Systems ......
همراه سایت و خاک، ساختار اثر متقابل با برنامه برای کاهش ...
Coupled Site and Soil-Structure Interaction Effects wit ......
نمایندگی تجارت الکترونیک: راه حل های بازار، مسائل امنیت ...
E-Commerce Agents: Marketplace Solutions, Security Issu ......
SIVA: امنیت اطلاعات تایید الگوریتم برای محل خدمات مبتنی ...
SIVA: Security Intelligence Verification Algorithm for ......
پیشرفت در هوش مصنوعی برای حفاظت از حریم خصوصی و امنیت
Advances in artificial intelligence for privacy protect ...
موضوع امنیت کاربرد نظریه دلبستگی به روانپزشکی و روان در ...
A Matter of Security The Application of Attachment Theo ......
Cybersecurity for Executives
Hacking Point of Sale
BackTrack 5 Cookbook
Practical Intrusion Analysis
خطرات تهدید کننده امنیت انرژی جهانی (ECE انرژی )
Emerging Global Energy Security Risks (Ece Energy)
Cuckoo Malware Analysis
Fragile networks
تغییر آب و هوا به عنوان یک خطر ام ...
Climate Change as a Security Ri ...
In this new flagship report, WBGU summarizes the state-of-the-art of science on the subject of Climate Change as a Security Risk. It is based on the f ...
Learning Nessus for Penetration ...
IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...
Penetration Testing with BackBo ...
BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been de ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
مفاهیم پایه و معرفی ابزار کرک
آموزش کرک کردن, فاطمه هاشم زاده, قفل سخت افزاری, کپی رایت در ایران, کراک, کراکر, کراکینگ, کرک
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...
همراه سایت و خاک، ساختار اثر متقا ...
Coupled Site and Soil-Structure ...
This volume covers papers presented at NATO ARW 983188 “Coupled Site and Soil-Structure Interaction Effects with Application to Seismic Risk Mitigatio ...
نمایندگی تجارت الکترونیک: راه حل ...
E-Commerce Agents: Marketplace ...
Among the many changes brought by the Internet is the emergence of electronic commerce over the Web. E-commerce activities, such as the online exchang ...
موضوع امنیت کاربرد نظریه دلبستگی ...
A Matter of Security The Applic ...
A contemporary case-based discussion of ethical dilemmas faced by researchers in forensic mental health, this book offers useful guidance to anyone pl ...
Cybersecurity for Executives
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, i ...
Hacking Point of Sale
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too ...
The Browser Hacker’s Handbook
The Browser Hacker’s Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attack ...
BackTrack 5 Cookbook
Learn to perform penetration tests with BackTrack 5. Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTr ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
خطرات تهدید کننده امنیت انرژی جها ...
Emerging Global Energy Security ...
This publication is the result of the analyses and discussions conducted by the Energy Security Forum on the global dimensions of emerging energy secu ...
Visual Cryptography and Secret ...
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Conside ...
Computer Forensics JumpStart, 2 ...
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Cuckoo Malware Analysis
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of ...
Web Penetration Testing with Ka ...
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source p ...
Protecting Your Mobile App IP: ...
Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t s ...
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Frag ...