GlassFish Security
Instant Kali Linux
PGP & GPG
Network Security Bible
Spring Security 3
Computer Viruses For Dummies
Crackproof Your Software
مباحثی پیرامون درب های پشتی
رویاروی انواع هکر - بخش سوم
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
مفاهیم پایه و معرفی ابزار کرک
آموزش کرک کردن, فاطمه هاشم زاده, قفل سخت افزاری, کپی رایت در ایران, کراک, کراکر, کراکینگ, کرک
رمزنگاری الگوریتمی
Algorithmic Cryptanalysis
این کتاب بر روی الگوریتمهای رمزنگاری کلیدی عمومی و خصوصی تمرکز میکند و به توصیف روشهای الگوریتمی با نمونههای مربوطه میپردازد. پس از معرفی رمزنگار ...
Disassembling Code: IDA Pro and ...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize di ...
مجله هک و امنیت گروه آشیانه - شما ...
معرفی مجله هک و امنیت گروه آشیانه - شماره 6 عناوین مجله الکترونیکی هک و امنیت گروه آشیانه شماره 6: - رقابت هکرهای ایران در آپا ...
Essential Cybersecurity Science
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to ap ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
Instant Kali Linux
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to m ...
PGP & GPG
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimme ...
آشنایی کلاسیک رمزنگاری ورزش کتاب
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...
مقدمه کلاسیک به رمزنگاری ورزش کتا ...
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
Computer Viruses For Dummies
Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in com ...
کوتاه و کاربردی از Nmap برای تست ...
کوتاه و کاربردی از Nmap برای تست نفوذ در این کتاب، همانند کتب دیگر ما از نصب ابزار Nmap بر روی ویندوز یا لینوکس و ... شروع نخواهیم کرد. چرا که در کتا ...
Crackproof Your Software
This essential resource for software developers highlights the weak points in “well-protected” software, shows how crackers break common protection sc ...
مباحثی پیرامون درب های پشتی
برچسب ها : . آموزش تصویری هک سایت, آموزش هک, آموزش هم, امنیت شبکه, بک دور, درب پشتی, روش های هکینگ, کتاب آموزش هک
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide ava ...
مجله هک و امنیت امپراطور - شماره ...
مجله هک و امنیت امپراطور - شماره دوم جلد دوم مجله گروه امنیتی امپراطور منتشر شد. در این مجله شما با مباحثی همچون: ۱۰ نکته امنیتی ، Backdoor.Trojan ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...