پیشرفت در امنیت فناوری اطلاعات سازمانی
Advances in Enterprise Information Technology Security
Database Nation
Fuzzing برای امنیت نرم افزار تضمین کیفیت و تست (خانه Ar ...
Fuzzing for Software Security Testing and Quality Assur ......
Hacking Exposed Mobile
پیشرفت در امنیت فناوری اطلاعات سازمانی
Advances in Enterprise Information Technology Security
Android Security Internals
Computer Viruses For Dummies
24 گناه مرگبار از نقص برنامه نویسی نرم افزار امنیتی و چ ...
24 Deadly Sins of Software Security Programming Flaws a ......
تسلط مامبو : تجارت الکترونیک ، قالب ها، ماژول توسعه ، S ...
Mastering Mambo: E-Commerce, Templates, Module Developm ......
مقاله آموزشی هک و امنیت شبکه
Data-Driven Security
حاکمیت شرکتی و امنیت منابع در چین ...
Corporate Governance and Resour ...
Corporate governance has become a household term and investors across the world are demanding more transparency and accountability from controllers of ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Disassembling Code: IDA Pro and ...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize di ...
Database Nation
As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardco ...
Fuzzing برای امنیت نرم افزار تضمی ...
Fuzzing for Software Security T ...
"Fuzzing for Software Security Testing and Quality Assurance" gives software developers a powerful new tool to build secure, high-quality software, an ...
Hacking For Dummies, 4th Editio ...
The best way to stay safe online is to stop hackers before they attack – first, by understanding their thinking and second, by ethically hacking your ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
Social Security For Dummies, 3r ...
Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial pla ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...
Hacking Exposed Mobile
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
مجله هک و امنیت امپراتور - شماره ...
معرفی مجله هک و امنیت امپراتور - شماره اول فهرست مطالب: مقدمه درباره آموزشی پیرامون SQL injection حملات XSS آموزش باگ Rfi پورت 7 و 13 پورت 25 پورت 8 ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...
Cryptography and Network Securi ...
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-stu ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Computer Viruses For Dummies
Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in com ...
تسلط مامبو : تجارت الکترونیک ، قا ...
Mastering Mambo: E-Commerce, Te ...
I ordered this item and it was returned as undeliverable - at least twice.So I really can't comment other than that - the delivery system is not very ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...