Cyberspace and Cybersecurity
Cuckoo Malware Analysis
آموزش امنیت وب سایت
Practical Malware Analysis
Hackers
Hacking Exposed, 6th Edition
Practical Intrusion Analysis
باگ اسکنر ها
Instant Kali Linux
امنیت هسته لینوکس
آموزش امنیت وب سایت
راهنمای عملی برای تضمین امنیت اطلاعات و مهندسی
A practical guide to security engineering and informati ...
Transnational Security
مقدمه کلاسیک به رمزنگاری ورزش کتا ...
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
Cyberspace and Cybersecurity
English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate Based on related courses and research on the cyber environment in Europe, th ...
Engineering Secure Software and ...
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Cuckoo Malware Analysis
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of ...
Web Penetration Testing with Ka ...
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source p ...
آموزش امنیت وب سایت
امروز هیچ تجارتی را نمی توان بدون داشتن یک وب سایت جهت معرفی خود و محصولات عرضه شده در نظر گرفت. وب سایت های مختلف که به عرضه ی خود در تمامی بخش ها مش ...
معاصر امنیت و استراتژی
Contemporary Security and Strat ...
Conflicting Identities and Multiple Masculinities takes as its focus the construction of masculinity in Western Europe from the early Middle Ages unti ...
Practical Malware Analysis
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current ...
Hackers
Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated ...
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following t ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
باگ اسکنر ها
توضیحات : امروزه هکر ها به جای صرف ساعتها وقت برای پیدا کردن حفره های امنیتی و ضعفهای برنامه نویسی صفحات وب از نرم افزارهای باگ اسکنر استفاده میکنند. ...
Instant Kali Linux
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to m ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Hacking Exposed Web Application ...
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security ...
Hacking Exposed Malware and Roo ...
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You wi ...
امنیت هسته لینوکس
لینوکس است. توزیع نرمافزار براساس این هسته «توزیع گنو/لینوکس» نامیده میشود. باید توجه کرد که هسته یک سامانهٔ کامل نیست، ساخت یک سامانهٔ کامل براسا ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
Essential Cybersecurity Science
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to ap ...
Advanced Penetration Testing fo ...
Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environm ...
آموزش امنیت وب سایت
توضیحات : امروز هیچ تجارتی را نمی توان بدون داشتن یک وب سایت جهت معرفی خود و محصولات عرضه شده در نظر گرفت. وب سایت های مختلف که به عرضه ی خود در تمامی ...
راهنمای عملی برای تضمین امنیت اطل ...
A practical guide to security e ...
• Examines the impact of both accidental and malicious, intentional action and inaction• Defines the five major components of a comprehensive and effe ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Gray Hat Hacking, 3rd Edition
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on ...