Moodle 4 Security. Enhance security, regulation, and compliance within your Moodle infrastructure 100,000 تومان
The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition 100,000 تومان
Ethical Hacking and Network Analysis with Wireshark : Exploration of network packets for detecting exploits and malware 100,000 تومان
Linux Hacking: A Beginner's Guide to Mastering CyberSecurity and Ethical Hacking with Linux Tools and Techniques 100,000 تومان
Ultimate Cyberwarfare for Evasive Cyber Tactics: Unravel the Techniques of Cyberwarfare, Hacktivism and Asymmetric Conflicts for Tactical Excellence with Real-world Use Cases and Strategic Insights 100,000 تومان
Cybersecurity Mastery: Defeat Cyber Threats, Enhance Your Defense, and Overcome Vulnerability with Expert Strategies to Navigate with Confidence. 100,000 تومان
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware 100,000 تومان
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap 100,000 تومان
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition 100,000 تومان