Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware 100,000 تومان
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap 100,000 تومان
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition 100,000 تومان
Secure Coordination Control of Networked Robotic Systems : From a Control Theory Perspective 100,000 تومان
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 100,000 تومان
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms 100,000 تومان
SIE Exam 2025/2026 For Dummies (Securities Industry Essentials Exam Prep + Practice Tests & Flashcards Online) 100,000 تومان
The Ultimate Kali Linux Book: Harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting, 3rd Edition 100,000 تومان
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS 100,000 تومان
Security Challenges with Blockchain: Navigate Blockchain Security Challenges, Unveil Vulnerabilities, and Gain Practical Strategies for Secure Application Development 100,000 تومان