The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:LANguardNessusSnortBASEACIDRmanSnortCenter.OSSECSguil
تعقيب الكاتبة على سلسله فيديوهات الدكتورة مايا صبحي حول الخيوط الخفيه للماسونية : Author's Comments on Dr. Maya Sobhi's Series of Videos about the Hidden Secrets of Freemasonry
Dr. Hidaia Mahmood Alassouli
bookSetup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Dr. Hidaia Mahmood Alassouli
bookCreating EPUB E-books Using EPUB Editors and Converters
Dr. Hidaia Mahmood Alassouli
bookConfiguration of Microsoft ISA Proxy Server and Linux Squid Proxy Server
Dr. Hidaia Mahmood Alassouli
bookSome Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassouli
bookPenetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools
Dr. Hidaia Mahmood Alassouli
bookعلامات الساعة الصغرى والكبرى : The Minor and Major Signs of Judgment Day
Dr. Hidaia Mahmood Alassouli
bookمختارات من مقالات الكاتبه حول قضايا سياسيه وإقتصاديه وإجتماعيه ومؤسساتيه ودينيه (إصدار عام 2022) : Selections from the Author's Articles on Political, Economic, Social, Institutional and Religious Issues, Issued in 2022
Dr. Hidaia Mahmood Alassouli
bookCommon Windows, Linux and Web Server Systems Hacking Techniques
Dr. Hidaia Mahmood Alassouli
bookFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
Dr. Hidaia Mahmood Alassouli
bookWireless and Mobile Hacking and Sniffing Techniques
Dr. Hidaia Mahmood Alassouli
bookأبرز أحداث يوم القيامه في ضوء ما جاء بالقرآن الكريم والسنه النبوية الشريفة : The Most Prominent Events on the Day of Judgment and the Resurrection Based on Quran and Sunnah
Dr. Hidaia Mahmood Alassouli
book
Exploding Data : Reclaiming Our Cyber Security in the Digital Age
Michael Chertoff
audiobookbookCYBER SECURITY HANDBOOK Part-1 : Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
bookIn Search of Schrödinger’s Cat : Quantum Physics and Reality
John Gribbin
audiobookHacking the Hacker
Roger A. Grimes
audiobookThe Generosity Secret
Nelson Searcy, Jennifer Dykes Henson
audiobookFruits Basket : Médiathèque 4
Roseline Mornet
bookThe Universal Timekeepers : Reconstructing History Atom by Atom
David J. Helfand
audiobookThe Hacker and the State
Ben Buchanan
audiobookCompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
Mike Chapple, David Seidl
audiobookJames Webb Space Telescope Mysteries : What Existed Before the Big Bang?
Martin Ettington
audiobookEasy Steps to Managing Cybersecurity
bookSplinters of Infinity : Cosmic Rays and the Clash of Two Nobel Prize-Winning Scientists over the Secrets of Creation
Mark Wolverton
audiobook