انتشارات No Exit Press
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008
Hacking. The Art of Exploitation
Jon Erickson, 2008
Hacking: The Art of Exploitation
Jon Erickson, 2003
Hacking: The Art of Exploitation
Jon Erickson, 2003
Hacking: The Art of Exploitation
Jon Erickson, 2008
Hacking: The Art of Exploitation w/CD
Jon Erickson, 2003
Online Privacy and Hacking
John Allen, 2014
Penetration Testing A Hands-On Introduction to Hacking
Georgia Weidman, 2014
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman, 2014
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman, 2014
Rewriting the Soul
Ian Hacking, 1995
Rewriting the soul: multiple personality and the sciences of memory
Ian Hacking, 1998
Rewriting the Soul: Multiple Personality and the Sciences of Memory
Ian Hacking, 1998
CCNP CIT Exam Certification Guide
Amir Ranjbar, 2004
CCNP CIT Exam Certification Guide
Amir Ranjbar, 2004
CCNP CIT Exam Certification Guide (CCNP Self-Study, 642-831) (2nd Edition)
Amir Ranjbar, 2003
CCNP CIT Exam Certification Guide (CCNP Self-Study, 642-831) (2nd Edition)
Amir Ranjbar, 2003
CCNP ISCW Official Exam Certification Guide
Brian Morgan, Neil Lovering, 2007
CCNP ISCW Official Exam Certification Guide
Brian Morgan, Neil Lovering, 2007
CCNP ISCW Portable Command Guide
Scott Empson, Hans Roth, 2008
