كتب واقعية
The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
© 2020 Dr. Hidaia Mahmood Alassouli (كتاب ): 9783969443545
تاريخ الإصدار
كتاب : ٢١ أغسطس ٢٠٢٠
كتب واقعية
The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
© 2020 Dr. Hidaia Mahmood Alassouli (كتاب ): 9783969443545
تاريخ الإصدار
كتاب : ٢١ أغسطس ٢٠٢٠
خطوة إلى عالم لا حدود له من القصص
لا توجد تعليقات بعد
قم بتنزيل التطبيق للانضمام إلى المحادثة وإضافة مراجعات.
عربي
مصر