Identity Attack Vectors: Implementing An Effective Identity And Access Management Solution 600,000 تومان
Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines 600,000 تومان
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence 600,000 تومان
Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity Management 600,000 تومان
Cybersecurity Attacks - Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage 600,000 تومان
The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice 600,000 تومان
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud 600,000 تومان
Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems 600,000 تومان
Mastering Azure Security: Safeguard your Azure workload with innovative cloud security measures 600,000 تومان