. . . . . . . . . . . . . . . 2013. . . . ) : .) : 2013.) : :) : :) .) .
Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools
Hidaia Mahmood Alassouli
bookعلامات الساعة الصغرى والكبرى : The Minor and Major Signs of Judgment Day
Hidaia Mahmood Alassouli
bookIntroduction to Power System Protection
Hidaia Mahmood Alassouli
bookQuick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs)
Hidaia Mahmood Alassouli
bookReview of the Specifications and Features of Different Smartphones Models
Hidaia Mahmood Alassouli
bookSetup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Hidaia Mahmood Alassouli
bookMethods to Overcome the Financial and Money Transfer Blockade against Palestine and any Country Suffering from Financial Blockade
Hidaia Mahmood Alassouli
bookEvaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware
Hidaia Mahmood Alassouli
bookIntroductory Guideline for Using Twilio Programmable Messaging and Programmable Voice Services
Hidaia Mahmood Alassouli
bookCreating Wordpress Online Store and Wordpress Online Magazine
Hidaia Mahmood Alassouli
bookمختارات من مقالات الكاتبه حول قضايا سياسيه وإقتصاديه وإجتماعيه ومؤسساتيه ودينيه (إصدار عام 2022)
Hidaia Mahmood Alassouli
book