Bitcoin Essentials
The InfoSec Handbook
What Is Computer Science?
ویروس کامپیوتر
معتاد به نفت: آمریکا درایو های بی امان برای امنیت انرژی
Addicted to Oil: America's Relentless Drive for Energy ...
آشنایی کلاسیک رمزنگاری - برنامه های کاربردی برای امنیت ...
A Classical Introduction to Cryptography - Applications ......
انطباقی امن پخش: تهدید تجزیه و تحلیل ترافیک و امنیت اطل ...
Adaptively Secure Broadcast: Threat Analytics & Sec ......
Network Forensics
Bitcoin for the Befuddled
Mastering Metasploit
Penetration Testing
Hacking, 2nd Edition
آشنایی با Hash و انواع آن
پیشرفت در امنیت و روش های پرداخت برای موبایل بازرگانی
Advances in Security and Payment Methods for Mobile Com ...
ایمنی و امنیت تجاری بودن سوخت هسته ای ذخیره سازی: گزارش ...
Safety and Security of Commercial Spent Nuclear Fuel St ......
نکته های امنیتی در Asp.Net
Big Data Forensics – Learning H ...
Big Data forensics is an important type of digital investigation that involves the identification, collection, and analysis of large-scale Big Data sy ...
Bitcoin Essentials
Blockchain is being billed as the technology of the future. Bitcoin is the first application of that technology. Mining is what makes it all possible. ...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field an ...
What Is Computer Science?
This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts br ...
Hacking Exposed Computer Forens ...
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, ...
ویروس کامپیوتر
ویروس کامپیوتر بیش از سه دهه ازساخت اولین ویروس کامپیوتری توسط فرد کوهن می گذرد . شاید درابتدا کوهن هرگزتصورنمی کرد که روزی اختراع اوبه صورت یک فاجعه ...
معتاد به نفت: آمریکا درایو های بی ...
Addicted to Oil: America's ...
The book begins with some good definitions that guide the global oil industry. In terms of "energy grades" oil is a clear winner for powering Large In ...
آشنایی کلاسیک رمزنگاری - برنامه ه ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security b ...
Network Forensics
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional ...
Bitcoin for the Befuddled
Unless you’ve been living under a rock for the last couple of years, you’ve probably heard of Bitcoin-the game-changing digital currency used by milli ...
Learning Nessus for Penetration ...
IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...
Mastering Metasploit
The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on variou ...
Penetration Testing
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Hacking, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl ...
آشنایی با Hash و انواع آن
آشنایی با Hash و انواع آن هش کدها به طور خلاصه کدهایی هستند بر اساس الگوریتمهایی که با محاسبات بر روی فایل ها تولید می شوند. یعنی طبق یک سری الگوریتم ...
مفاهیم پایه و معرفی ابزار کرک
آموزش کرک کردن, فاطمه هاشم زاده, قفل سخت افزاری, کپی رایت در ایران, کراک, کراکر, کراکینگ, کرک
آشنایی کلاسیک رمزنگاری ورزش کتاب
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
پیشرفت در امنیت و روش های پرداخت ...
Advances in Security and Paymen ...
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subje ...
ایمنی و امنیت تجاری بودن سوخت هست ...
Safety and Security of Commerci ...
In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study ...
Learning Pentesting for Android ...
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are pu ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
نکته های امنیتی در Asp.Net
امروزه استفاده از صفحات Asp.net یکی از مهمترین کارهای برنامه نویسان وب است. ولی این صفحات دارای ضعف های فراوان میباشند. این کتاب ضعف های مذکور را در ق ...
موضوع امنیت کاربرد نظریه دلبستگی ...
A Matter of Security The Applic ...
A contemporary case-based discussion of ethical dilemmas faced by researchers in forensic mental health, this book offers useful guidance to anyone pl ...