Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux 100,000 تومان
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity 100,000 تومان
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide : Essential strategies for compliance, governance, and risk management 100,000 تومان
Security for Cloud Native Applications : The practical guide for securing modern applications using AWS, Azure, and GCP 100,000 تومان
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms 100,000 تومان
Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches 100,000 تومان
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense 100,000 تومان
Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics 100,000 تومان
The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamic 100,000 تومان
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing 100,000 تومان
MongoDB with Python for Beginners: complete guide to dealing with Data using MongoDB and Learn Python Programming 100,000 تومان
Vue Mastery: Build Dynamic Frontends with Router & Composition API: Build Frontend Applications with Vue.js - Combining the Best Features of Angular and React 100,000 تومان
Using Stable Diffusion with Python: Leverage Python to control and automate high-quality AI image generation 100,000 تومان
Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures, 4th Edition 100,000 تومان
Databricks Certified Associate Developer for Apache Spark Using Python: The ultimate guide to getting certified 100,000 تومان