1983

1984 1983 1982 1981 1980

Saturday, August 21, 2010

امنیت

امنیت

UMTS Security

GSM Security Survey

Wiretap Channel Capacity

Network Coding Security

Routing Protocols Security in Ad-hoc Networks

frash MSc Thesis

Mobile Ad-hoc Network Security (MANET Sec)

Security Improvement of Ad-hoc Networks Routing Protocols

Electronic War and Information Security

 

Persian REFs:

  • security/web/Attack Againt IIS-2.pdf
  • security/web/botnet.pdf

  • security/web/cisco.pdf

  • security/web/Contact-Hackers1.pdf

  • security/web/Contact-Hackers2.pdf

  • security/web/Contact-Hackers3.pdf

  • security/web/Contact-Hackers4.pdf

  • security/web/DNS Attacking Protocol Edition 1.pdf

  • security/web/info-gathering1.pdf

  • security/web/ipsec1.pdf

  • security/web/IranPrisons Hacking Eposed.pdf

  • security/web/l0pht Hackers.doc

  • security/web/Mail_Security.pdf

  • security/web/Mail_Security2.pdf

  • security/web/Make a Secure Conection.pdf

  • security/web/Microsoft Internet Information Server Attack.pdf

  • security/web/shadow software attack.pdf

  • security/web/The Methodology of web hacking.pdf

  • security/web/URL.pdf

  • security/web/URL2.pdf

  • security/web/Virus_Ch1.pdf

  • security/web/Virus_ch2.pdf

  • security/web/virus_ch3.pdf

  • security/web/virus_ch4.pdf

  • security/web/Web Server Hacking1.pdf

  • security/web/Web_Traditional_And_New_Attack.pdf

  • security/web/WebArchitectur-Interview.pdf

  • security/web/WebSecurity in MS ASP .Net1.pdf

  • security/web/wirelesshacking.pdf

Posted by blogger at 5:59 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (14)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (2)
    • ►  May (1)
  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (1)
    • ►  September (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (7)
    • ►  July (2)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (10)
    • ►  November (3)
    • ►  September (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  February (2)
  • ►  2011 (51)
    • ►  December (4)
    • ►  November (2)
    • ►  October (1)
    • ►  September (5)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (21)
    • ►  April (5)
    • ►  March (1)
    • ►  January (7)
  • ▼  2010 (47)
    • ►  December (3)
    • ►  November (6)
    • ►  October (8)
    • ►  September (8)
    • ▼  August (21)
      • سایت ایران فایل هک شد
      • National Search Engine موتور جستجو گر ملی وب
      • National Web Browser مرورگر ملی وب
      • Extra Security فرا امنیت
      • وبلاگ کودکان خیال
      • تجدید فراش
      • رمزنگاری و امنیت شبکه
      • Sharif Security and Cryptography
      • Security & Cryptology at Sharif University
      • امنیت
      • Steganalysis using eigenvalues
      • Wireless Mobile Adhoc Network Security Simulator
      • Wireless Mobile Ad-hoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • شاخه دانشجویی انجمن رمز ایران
      • Diman Tootaghaj (دیمن توت آغاج)
      • Diman Zad-Tootaghaj (دیمن زادتوت آغاج)
      • Game-Theoretic Network Simulator (GTNS)
    • ►  April (1)

My Blog List

  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago
  • Farshid Farhat @ Penn State

Farshid Farhat

Loading...

Diman Zad Tootaghaj

Loading...

Deep Learning

Loading...

Computer Vision and Pattern Recognition

Loading...

BIG DATA Computation

Loading...

Persian Girl

Loading...

Dawn of Darkness

Loading...

Diman Zad Tootaghaj

Loading...

Diman Zad Tootaghaj

Loading...

Loading...

Loading...

Loading...
Simple theme. Powered by Blogger.