The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:LANguardNessusSnortBASEACIDRmanSnortCenter.OSSECSguil
Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools
Dr. Hidaia Mahmood Alassouli
bookعلامات الساعة الصغرى والكبرى : The Minor and Major Signs of Judgment Day
Dr. Hidaia Mahmood Alassouli
bookتعقيب الكاتبة على سلسله فيديوهات الدكتورة مايا صبحي حول الخيوط الخفيه للماسونية : Author's Comments on Dr. Maya Sobhi's Series of Videos about the Hidden Secrets of Freemasonry
Dr. Hidaia Mahmood Alassouli
bookمختارات من مقالات الكاتبه حول قضايا سياسيه وإقتصاديه وإجتماعيه ومؤسساتيه ودينيه (إصدار عام 2022) : Selections from the Author's Articles on Political, Economic, Social, Institutional and Religious Issues, Issued in 2022
Dr. Hidaia Mahmood Alassouli
bookCommon Windows, Linux and Web Server Systems Hacking Techniques
Dr. Hidaia Mahmood Alassouli
bookWireless and Mobile Hacking and Sniffing Techniques
Dr. Hidaia Mahmood Alassouli
bookFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
Dr. Hidaia Mahmood Alassouli
bookأبرز أحداث يوم القيامه في ضوء ما جاء بالقرآن الكريم والسنه النبوية الشريفة : The Most Prominent Events on the Day of Judgment and the Resurrection Based on Quran and Sunnah
Dr. Hidaia Mahmood Alassouli
bookFuse Protection against the Regenerative Circuit Internal Commutation Fault
Dr. Hidaia Mahmood Alassouli
bookComparison between Internet Fax Services
Dr. Hidaia Mahmood Alassouli
bookCalculation of Critical Distance in Faulted Meshed Power System
Dr. Hidaia Mahmood Alassouli
bookIntroduction to Power System Protection
Dr. Hidaia Mahmood Alassouli
book
Building Full Linux Mail Server Solution with Virtual Domains and Users
Dr. Hedaya Mahmood Alasooly
bookRussian Cyber Attack - Grizzly Steppe Report & The Rules of Cyber Warfare : Hacking Techniques Used to Interfere the U.S. Election and to Exploit Government & Private Sectors, Recommended Mitigation Strategies and International Cyber-Conflict Law
U.S. Department of Defense, Department of Homeland Security, Federal Bureau of Investigation, Strategic Studies Institute, United States Army War College
bookHacking your destiny
Karl Lillrud
audiobookbookHacking Leadership : The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly
Mike Myatt
audiobookHacking : Guide to Computer Hacking and Penetration Testing
Alex Nordeen
bookHacking into Hackers’ Head
Kamal Nayan
bookGrowth Hacking For Dummies
Anuj Adhiya
audiobookHacking Marketing : The Ultimate Guide to Online Marketing Secrets, Learn How to Use Social Networking For Marketing and The Internet Marketing Mistakes You Need to Avoid
Gregory Lawson
audiobookHacking Artificial Intelligence : A Leader's Guide from Deepfakes to Breaking Deep Learning
Davey Gibian
audiobookEthical Hacking and Computer Securities For Beginners
Elaiya Iswera Lallan
bookLinux : The Ultimate Beginner's Guide to Learn Linux Operating System, Command Line and Linux Programming Step by Step
Ryan Turner
audiobookCyber Smart : Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Bart R. McDonough
audiobook