حملات تهاجمی نیمه روش جدیدی برای تجزیه و تحلیل امنیت سخ ...
Semi-invasive attacks A new approach to hardware secu ......
Cyberspace and Cybersecurity
Hackers
باگ اسکنر ها
راهنمای عملی برای تضمین امنیت اطلاعات و مهندسی
A practical guide to security engineering and informati ...
Practical Malware Analysis
Hacking Exposed, 6th Edition
امنیت هسته لینوکس
تحرک هوا: کلید استراتژی امنیت ملی آمریکا (کتابخانه دانش ...
Air Mobility: The Key to the United States National Sec ......
Instant Kali Linux
نکته های امنیتی در Asp.Net
آموزش امنیت وب سایت
آموزش امنیت وب سایت
امروز هیچ تجارتی را نمی توان بدون داشتن یک وب سایت جهت معرفی خود و محصولات عرضه شده در نظر گرفت. وب سایت های مختلف که به عرضه ی خود در تمامی بخش ها مش ...
معاصر امنیت و استراتژی
Contemporary Security and Strat ...
Conflicting Identities and Multiple Masculinities takes as its focus the construction of masculinity in Western Europe from the early Middle Ages unti ...
مقدمه کلاسیک به رمزنگاری ورزش کتا ...
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
حملات تهاجمی نیمه روش جدیدی برای ...
Semi-invasive attacks A new a ...
Книга по аппаратному взлому.Based on a dissertation submitted September 2004 by the author for the degree of Doctor of Philosophy to the University of ...
Cyberspace and Cybersecurity
English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate Based on related courses and research on the cyber environment in Europe, th ...
Engineering Secure Software and ...
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila ...
Web Penetration Testing with Ka ...
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source p ...
Hackers
Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated ...
Protecting Your Mobile App IP: ...
Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t s ...
باگ اسکنر ها
توضیحات : امروزه هکر ها به جای صرف ساعتها وقت برای پیدا کردن حفره های امنیتی و ضعفهای برنامه نویسی صفحات وب از نرم افزارهای باگ اسکنر استفاده میکنند. ...
راهنمای عملی برای تضمین امنیت اطل ...
A practical guide to security e ...
• Examines the impact of both accidental and malicious, intentional action and inaction• Defines the five major components of a comprehensive and effe ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Practical Malware Analysis
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current ...
Hacking Exposed Malware and Roo ...
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You wi ...
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following t ...
امنیت هسته لینوکس
لینوکس است. توزیع نرمافزار براساس این هسته «توزیع گنو/لینوکس» نامیده میشود. باید توجه کرد که هسته یک سامانهٔ کامل نیست، ساخت یک سامانهٔ کامل براسا ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Advanced Penetration Testing fo ...
Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environm ...
Instant Kali Linux
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to m ...
Hacking Exposed Web Application ...
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security ...
نکته های امنیتی در Asp.Net
توضیحات : امروزه استفاده از صفحات Asp.net یکی از مهمترین کارهای برنامه نویسان وب است. ولی این صفحات دارای ضعف های فراوان میباشند. این کتاب ضعف های مذ ...
آموزش امنیت وب سایت
توضیحات : امروز هیچ تجارتی را نمی توان بدون داشتن یک وب سایت جهت معرفی خود و محصولات عرضه شده در نظر گرفت. وب سایت های مختلف که به عرضه ی خود در تمامی ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
امنیت شبکه های بی سیم Multihop
Security for Multihop Wireless ...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a dif ...