Python Hacking Essentials
Transnational Security
Asset Attack Vectors
آشنایی با ریاضی رمزنگاری (متون کارشناسی ریاضی)
An Introduction to Mathematical Cryptography (Undergrad ...
پیشرفت در روش های امنیتی و پرداخت برای تجارت تلفن همراه
Advances in security and payment methods for mobile com ...
A Practical Guide to TPM 2.0
Cyber Threat!
کد: مقدمه ای بر رمزنگاری و اطلاعا ...
Codes: An introduction to infor ...
Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle it, for example, mobile ph ...
Python Hacking Essentials
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Her ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Hacking Exposed Wireless, 2nd E ...
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
Windows Malware Analysis Essent ...
Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. ...
Gray Hat Hacking, 3rd Edition
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
دفاع دیجیتال: تایید امنیت اطلاعات
DIGITAL DEFENSE: VERIFICATION O ...
Abstract: The basic objective of digital defense is to verify the security intelligence of a distributed computing system (DCS) so that the informatio ...
Official (ISC)2 Guide to the CI ...
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was develope ...
Asset Attack Vectors
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are d ...
آشنایی با ریاضی رمزنگاری (متون کا ...
An Introduction to Mathematical ...
This is a fantastic book. The writing is simple and clear. Even if I skipped class for a week, I could sit down and read this book, confident I would ...
The Antivirus Hacker’s Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker’s Handbook guides you through the process of reverse engineering ...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows secur ...
Wireshark Network Analysis, 2nd ...
Wireshark is the world’s most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
Cyber Threat!
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...
آموزش جلوگیری از حملات XSS و CSS
برچسب ها : . XSS CSS, اکسپلویت نویسی, پارس هکرز, کتاب هک فارسی, نحوه پیدا کردن باگ
آشنایی کلاسیک رمزنگاری ورزش کتاب
A Classical Introduction to Cry ...
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully r ...
تصویربرداری 3D برای ایمنی و امنیت ...
3D Imaging for Safety and Secur ...
This book presents the thoroughly revised versions of lectures given by leading researchers during the Workshop on Advanced 3D Imaging for Safety and ...