نکته های امنیتی در Asp.Net
نیروگاه هسته ای ابزار دقیق و کنترل سیستم های ایمنی و ام ...
Nuclear Power Plant Instrumentation and Control Systems ......
پیشرفت در هوش مصنوعی برای حفاظت از حریم خصوصی و امنیت
Advances in artificial intelligence for privacy protect ...
موضوع امنیت کاربرد نظریه دلبستگی به روانپزشکی و روان در ...
A Matter of Security The Application of Attachment Theo ......
BeagleBone for Secret Agents
Hacking Point of Sale
Cuckoo Malware Analysis
جهان نا امنی: دیدگاه انسان شناسی امنیت
A World of Insecurity: Anthropological Perspectives of ...
نمایندگی تجارت الکترونیک: راه حل های بازار، مسائل امنیت ...
E-Commerce Agents: Marketplace Solutions, Security Issu ......
SIVA: امنیت اطلاعات تایید الگوریتم برای محل خدمات مبتنی ...
SIVA: Security Intelligence Verification Algorithm for ......
خطرات تهدید کننده امنیت انرژی جهانی (ECE انرژی )
Emerging Global Energy Security Risks (Ece Energy)
Cybersecurity for Executives
Practical Intrusion Analysis
مباحثی پیرامون درب های پشتی
مباحثی پیرامون درب های پشتی
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Frag ...
نکته های امنیتی در Asp.Net
امروزه استفاده از صفحات Asp.net یکی از مهمترین کارهای برنامه نویسان وب است. ولی این صفحات دارای ضعف های فراوان میباشند. این کتاب ضعف های مذکور را در ق ...
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...
موضوع امنیت کاربرد نظریه دلبستگی ...
A Matter of Security The Applic ...
A contemporary case-based discussion of ethical dilemmas faced by researchers in forensic mental health, this book offers useful guidance to anyone pl ...
تغییر آب و هوا به عنوان یک خطر ام ...
Climate Change as a Security Ri ...
In this new flagship report, WBGU summarizes the state-of-the-art of science on the subject of Climate Change as a Security Risk. It is based on the f ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Hacking Point of Sale
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too ...
Penetration Testing with BackBo ...
BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been de ...
The Browser Hacker’s Handbook
The Browser Hacker’s Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attack ...
Cuckoo Malware Analysis
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ...
جهان نا امنی: دیدگاه انسان شناسی ...
A World of Insecurity: Anthropo ...
Human security is a key element in the measure of well-being and is a hot topic in anthropology and development studies. A World of Insecurity outline ...
نمایندگی تجارت الکترونیک: راه حل ...
E-Commerce Agents: Marketplace ...
Among the many changes brought by the Internet is the emergence of electronic commerce over the Web. E-commerce activities, such as the online exchang ...
خطرات تهدید کننده امنیت انرژی جها ...
Emerging Global Energy Security ...
This publication is the result of the analyses and discussions conducted by the Energy Security Forum on the global dimensions of emerging energy secu ...
Visual Cryptography and Secret ...
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Conside ...
Computer Forensics JumpStart, 2 ...
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Cybersecurity for Executives
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, i ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
مباحثی پیرامون درب های پشتی
برچسب ها : . آموزش تصویری هک سایت, آموزش هک, آموزش هم, امنیت شبکه, بک دور, درب پشتی, روش های هکینگ, کتاب آموزش هک
مباحثی پیرامون درب های پشتی
آموزش تصویری هک سایت, آموزش هک, آموزش هم, امنیت شبکه, بک دور, درب پشتی, روش های هکینگ, کتاب آموزش هک
همراه سایت و خاک، ساختار اثر متقا ...
Coupled Site and Soil-Structure ...
This volume covers papers presented at NATO ARW 983188 “Coupled Site and Soil-Structure Interaction Effects with Application to Seismic Risk Mitigatio ...