Personal Cybersecurity
امنیت سرور لینوکس
شبکه نرم افزار : مجازی سازی ، SDN ، 5G ، امنیت
Software Networks: Virtualization, SDN, 5G, Security
سهم از زمین سنجش از راه دور برای تصمیم گیری در مورد امن ...
COntributions of land remote sensing for decisions abou ......
Cloud Security and Privacy
Rootkits For Dummies
آموزش دور زدن رمز ویندوز 7
The Myths of Security
رهبری با مثال: چگونه ما می تواند انرژی و امنیت انقلاب ا ...
Leading by Example: How We Can Inspire an Energy and Se ......
The Architecture of Privacy
CISSP All-in-One Exam Guide, 7t ...
A fully revised edition of the #1 CISSP training resource Thoroughly updated for the latest release of the Certified Information Systems Security Prof ...
The Hacker Playbook 2: Practica ...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be un ...
Personal Cybersecurity
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practic ...
Pro iOS Security and Forensics
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vul ...
مجله هک و امنیت گروه امپراطور - ش ...
معرفی مجله هک و امنیت گروه امپراطور - شماره 5 در این جلد از مجلات گروه امنیتی امپراطور شما را با مطالب زیر آشنا خواهیم کرد. عناوین مجله الکترونیکی ه ...
چگونه امنیت خانواده مان را در این ...
چگونه امنیت خانواده مان را در اینترنت حفظ کنیم؟ میلیونها خانواده در سرتاسر دنیا هر روز از اینترنت برای یادگیری، پژوهش، خرید و فروش، استفاده از خدمات ...
شبکه نرم افزار : مجازی سازی ، SDN ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
سهم از زمین سنجش از راه دور برای ...
COntributions of land remote se ...
Land remote sensing: the use of space-based satellite technologies to obtain information on environmental variables such as land-use and land-covering ...
Hacking For Dummies, 5th Editio ...
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! “Hacking ...
The Hacker Playbook: Practical ...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be un ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Rootkits For Dummies
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system’s ...
شرحی بر حملات تکذیب سرویس - Denia ...
شرحی بر حملات تکذیب سرویس - Denial of Service Attacks در سال های قبل در دنیای هکرها حملات کامپیوتری اکثرا از یک نوع بود و مانند حملات امروزی از انواع ...
آموزش دور زدن رمز ویندوز 7
آموزش دور زدن رمز ویندوز 7 این احتمال دارد که شما رمز عبور خود را به یاد نیاورید یا در هنگام انتخاب رمز برای ویندوز دقت نکرده باشید و رمز مورد نظر خو ...
مجله هک و امنیت گروه امپراطور - ش ...
معرفی مجله هک و امنیت گروه امپراطور - شماره 3 دانلود مجله هک و امنیت گروه امپراطور - شماره 3 عناوین: بالا بردن امنیت با Htaccess آموزش باگ Sql I ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This boo ...
Mastering Bitcoin, 2nd Edition
Join the technological revolution that’s taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
رهبری با مثال: چگونه ما می تواند ...
Leading by Example: How We Can ...
Global climate change? We can stop it.Addiction to oil?We can replace it.Technological innovation?We can create it.But we can't wait twenty, thirty, o ...
Cybersecurity for Hospitals and ...
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerab ...
The Architecture of Privacy
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new ...
Learning Metasploit Exploitatio ...
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. ...