PDF
-پژوهش های علمی صنعتیhttp://security.irost.org/ebooks/Hacker's Guide.pdf۱۳۹۴/۵/۳۰ -
3 TCP/IP ist das Internet 4.4 Zusammenfassung 5 Hacker und Cracker 5.1 Was ist der Unterschied zwischen Hackern und Crackern? 5.2 Wo fing das alles an? 5.3 Die...
PDF
-پژوهش های علمی صنعتیhttp://security.irost.org/.../Maximum Computer Security-A Hacke...۱۳۹۴/۵/۳۰ -
Chapter 24 - Security Concepts VI The Remote Attack • Chapter 25 - The Remote Attack • Chapter 26 - Levels of Attack • Chapter 27 - Firewalls • Chapter 28 -...
PDF
-دانشگاه علوم پزشکی تهرانhttp://jdt.tums.ac.ir/index.php/jdt/article/view/1611/905۱۳۹۵/۹/۴ -
1.15 0.4 34.66 2.88 0.45 34.66 0.57 0.5 36.33 1.15 7 0.05 2...
PDF
CopyrightPage 1of 1http://www.koreanwar2.org/.../The Sea Services in the Korean Wa...۱۳۹۴/۷/۸ -
attained on conditions acceptable to us. The Korean War began at 4:00 am on June 25, 1950 when seven crack divisions of North Korean troops stormed across the 38th...