انتشارات Syngress, , Elsevier Inc
![Meeting People via Wi: Fi and Bluetooth](http://cdn.ketabkoo.com/covers/7/792479-n.jpg)
Meeting People via Wi: Fi and Bluetooth
Dalziel, Henry, 2016![Next Generation Red Teaming](http://cdn.ketabkoo.com/covers/7/792480-n.jpg)
Next Generation Red Teaming
Dalziel, 2015![PCI DSS 3.1. The Standard That Killed SSL](http://cdn.ketabkoo.com/covers/7/792481-n.jpg)
PCI DSS 3.1. The Standard That Killed SSL
Williams, 2015![Practical anonymity: hiding in plain sight online](http://cdn.ketabkoo.com/covers/7/792482-n.jpg)
Practical anonymity: hiding in plain sight online
Peter Loshin, 2013![Practical anonymity: hiding in plain sight online](http://cdn.ketabkoo.com/covers/7/792483-n.jpg)
Practical anonymity: hiding in plain sight online
Peter Loshin, 2013![Securing Social Media in the Enterprise](http://cdn.ketabkoo.com/covers/7/792484-n.jpg)
Securing Social Media in the Enterprise
Dalziel, 2015![Web application obfuscation](http://cdn.ketabkoo.com/covers/7/792486-n.jpg)
Web application obfuscation
Mario Heiderich, 2011![Web Application Obfuscation: '- WAFs..Evasion..Filters alert( Obfuscation )-'](http://cdn.ketabkoo.com/covers/7/792487-n.jpg)
Web Application Obfuscation: '- WAFs..Evasion..Filters alert( Obfuscation )-'
Mario Heiderich, 2011![Cyber warfare : techniques, tactics and tools for security practitioners](http://cdn.ketabkoo.com/covers/10/1050349-n.jpg)
Cyber warfare : techniques, tactics and tools for security practitioners
Jason Andress, 2011![CISSP Study Guide, Third Edition](http://cdn.ketabkoo.com/covers/10/1052571-n.jpg)
CISSP Study Guide, Third Edition
Conrad, Eric, 2016![Detecting and Combating Malicious Email](http://cdn.ketabkoo.com/covers/10/1052573-n.jpg)
Detecting and Combating Malicious Email
Julie JCH Ryan, 2014![Dissecting the hack : the v3rb0ten network](http://cdn.ketabkoo.com/covers/10/1052574-n.jpg)
Dissecting the hack : the v3rb0ten network
Baskin, Brian, 2015![Hacking and penetration testing with low power devices](http://cdn.ketabkoo.com/covers/10/1052575-n.jpg)
Hacking and penetration testing with low power devices
Philip Polstra, 2015![How to Cheat at Configuring Open Source Security Tools](http://cdn.ketabkoo.com/covers/10/1052576-n.jpg)
How to Cheat at Configuring Open Source Security Tools
Renaud Deraison, 2004![How to Cheat at Configuring Open Source Security Tools](http://cdn.ketabkoo.com/covers/10/1052577-n.jpg)
How to Cheat at Configuring Open Source Security Tools
Michael Gregg, 2007![Introduction to cyber-warfare: a multidisciplinary approach](http://cdn.ketabkoo.com/covers/10/1052578-n.jpg)
Introduction to cyber-warfare: a multidisciplinary approach
Paulo Shakarian, 2013![Introduction to cyber-warfare: a multidisciplinary approach](http://cdn.ketabkoo.com/covers/10/1052579-n.jpg)
Introduction to cyber-warfare: a multidisciplinary approach
Paulo Shakarian, 2013![You: for sale : protecting your personal data and privacy online](http://cdn.ketabkoo.com/covers/10/1063749-n.jpg)
You: for sale : protecting your personal data and privacy online
Rispoli, Mike; Sumner, Stuart, 2016![SQL injection attacks and defense: Description based on print version record](http://cdn.ketabkoo.com/covers/12/1274051-n.jpg)
SQL injection attacks and defense: Description based on print version record
Clarke, Justin, 2009![Coding for penetration testers: building better tools](http://cdn.ketabkoo.com/covers/12/1274054-n.jpg)