skip to main | skip to sidebar

Extreme Supporter

Saturday, August 21, 2010

امنیت

امنیت

UMTS Security

GSM Security Survey

Wiretap Channel Capacity

Network Coding Security

Routing Protocols Security in Ad-hoc Networks

frash MSc Thesis

Mobile Ad-hoc Network Security (MANET Sec)

Security Improvement of Ad-hoc Networks Routing Protocols

Electronic War and Information Security

 

Persian REFs:

  • security/web/Attack Againt IIS-2.pdf
  • security/web/botnet.pdf

  • security/web/cisco.pdf

  • security/web/Contact-Hackers1.pdf

  • security/web/Contact-Hackers2.pdf

  • security/web/Contact-Hackers3.pdf

  • security/web/Contact-Hackers4.pdf

  • security/web/DNS Attacking Protocol Edition 1.pdf

  • security/web/info-gathering1.pdf

  • security/web/ipsec1.pdf

  • security/web/IranPrisons Hacking Eposed.pdf

  • security/web/l0pht Hackers.doc

  • security/web/Mail_Security.pdf

  • security/web/Mail_Security2.pdf

  • security/web/Make a Secure Conection.pdf

  • security/web/Microsoft Internet Information Server Attack.pdf

  • security/web/shadow software attack.pdf

  • security/web/The Methodology of web hacking.pdf

  • security/web/URL.pdf

  • security/web/URL2.pdf

  • security/web/Virus_Ch1.pdf

  • security/web/Virus_ch2.pdf

  • security/web/virus_ch3.pdf

  • security/web/virus_ch4.pdf

  • security/web/Web Server Hacking1.pdf

  • security/web/Web_Traditional_And_New_Attack.pdf

  • security/web/WebArchitectur-Interview.pdf

  • security/web/WebSecurity in MS ASP .Net1.pdf

  • security/web/wirelesshacking.pdf

Posted by blogger at 5:59 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Blog Archive

  • ►  2017 (12)
    • ►  November (3)
    • ►  October (1)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2016 (1)
    • ►  April (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (5)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
  • ►  2012 (13)
    • ►  November (3)
    • ►  July (1)
    • ►  June (3)
    • ►  May (2)
    • ►  March (2)
    • ►  February (2)
  • ►  2011 (55)
    • ►  December (3)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (1)
    • ►  June (2)
    • ►  May (21)
    • ►  April (5)
    • ►  March (1)
    • ►  February (2)
    • ►  January (9)
  • ▼  2010 (49)
    • ►  December (4)
    • ►  November (7)
    • ►  October (7)
    • ►  September (8)
    • ▼  August (19)
      • سایت ایران فایل هک شد
      • National Search Engine موتور جستجو گر ملی وب
      • National Web Browser مرورگر ملی وب
      • Extra Security فرا امنیت
      • وبلاگ کودکان خیال
      • رمزنگاری و امنیت شبکه
      • Sharif Security and Cryptography
      • Security & Cryptology at Sharif University
      • امنیت
      • Steganalysis using eigenvalues
      • Wireless Mobile Ad-hoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • شاخه دانشجویی انجمن رمز ایران
      • Diman Tootaghaj (دیمن توت آغاج)
      • Diman Zad-Tootaghaj (دیمن زادتوت آغاج)
      • Game-Theoretic Network Simulator (GTNS)
    • ►  April (3)
    • ►  January (1)
  • ►  2009 (11)
    • ►  November (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (11)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2007 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (3)
  • ►  2006 (26)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (5)
    • ►  April (4)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2005 (18)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • فرشید

My Blog List

  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    9 years ago

  • Sites.Google.Com
  • Automatic Rating for Photo Aesthetics
  • Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
  • PIAKAP
  • Bid Data Analytics

  • Latest research done by November 2017
  • UICC-based secure communication
  • Your iCloud storage is almost full.
  • Smart Aesthetic Scoring for Better Photography
  • Deep Learning in Penn State

  • انتروپی پوچ
  • باخیال فراموشی
  • عاشقتم
  • What is the best strategy
  • آنارشیسم اجتماعی