BeagleBone for Secret Agents
مقاله آموزشی هک و امنیت شبکه
آشنایی کلاسیک رمزنگاری - برنامه های کاربردی برای امنیت ...
A Classical Introduction to Cryptography - Applications ......
تصویربرداری 3D برای ایمنی و امنیت (تصویربرداری محاسباتی ...
3D Imaging for Safety and Security (Computational Imagi ......
آشنایی کلاسیک رمزنگاری: برنامه های کاربردی برای امنیت ا ...
A Classical Introduction to Cryptography: Applications ......
قانون کامپیوتر و گزارش امنیتی. مخابرات پخش و قانون رقاب ...
Computer Law And Security Report. Telecommunications, b ......
BeagleBone for Secret Agents
Advanced API Security
Android Hacker’s Handbook
Android Security Internals
نحوه عملکرد فایروالها
Black Hat Python
بیوتکنولوژی ، امنیت و جستجو برای ...
Biotechnology, Security and the ...
Since 9/11 and the U.S. anthrax attacks, public, and policy concerns about the security threats posed by biological weapons has increased significantl ...
مجله هک و امنیت گروه آشیانه - شما ...
معرفی مجله هک و امنیت گروه آشیانه - شماره 4 عناوین مجله الکترونیکی هک و امنیت گروه آشیانه شماره 4: - گروه آشیانه در رتبه دومین هکر برتر - آموزش SQL I ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Social Security For Dummies, 3r ...
Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial pla ...
Managing Risk and Information S ...
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience abou ...
آشنایی کلاسیک رمزنگاری - برنامه ه ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security b ...
Big Data Forensics – Learning H ...
Big Data forensics is an important type of digital investigation that involves the identification, collection, and analysis of large-scale Big Data sy ...
تصویربرداری 3D برای ایمنی و امنیت ...
3D Imaging for Safety and Secur ...
This book presents the thoroughly revised versions of lectures given by leading researchers during the Workshop on Advanced 3D Imaging for Safety and ...
آشنایی کلاسیک رمزنگاری: برنامه ها ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: ApplicationsВ for Communications Security introduces fundamentals of information and communication security ...
قانون کامپیوتر و گزارش امنیتی. مخ ...
Computer Law And Security Repor ...
This groundbreaking work provides a one-stop source for all lawyers advising on the law of photography and digital images. Presenting commentary on al ...
استفاده از روشهای فازی در بیو متر ...
استفاده از روشهای فازی در بیو متریک اثر انگشت در این پژوهش ابتدا در مورد، ابتدا در مورد اثر انگشت و تاریخچه منطق فازی و همچنین شرح مختصری در مورد است ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
Android Hacker’s Handbook
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by expe ...
نظریه محاسباتی اعداد و رمزنگاری م ...
Computational Number Theory and ...
The only book to provide a unified view of the interplay between computational number theory and cryptographyComputational number theory and modern cr ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Black Hat Python
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the mag ...
چگونه از شبکه خود در مقابل مهندسی ...
برچسبها: مهندسی اجتماعی، محافظت از شبکه، امنیت شبکه
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
مجله هک و امنیت گروه امپراطور - ش ...
معرفی مجله هک و امنیت گروه امپراطور - شماره 3 دانلود مجله هک و امنیت گروه امپراطور - شماره 3 عناوین: بالا بردن امنیت با Htaccess آموزش باگ Sql I ...
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...