[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fh-vDR-cF4PW9aneHAjFuV1sm_iZ-ZZsNO140ZY_ghpA":3},{"id":4,"name":5,"bio":6,"avatarUrl":6,"views":7,"verified":8,"banned":8,"booksCount":9,"totalBooks":9,"page":10,"limit":11,"totalPages":10,"categories":12,"books":21},22189,"أسامة محمد فتحي",null,251,false,12,1,24,[13,17],{"id":14,"title":15,"count":16},7,"تكنولوجيا و إنترنت",9,{"id":18,"title":19,"count":20},51,"غير مصنف",3,[22,30,35,40,45,50,55,60,65,70,75,80],{"id":23,"title":24,"coverUrl":25,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":27,"categoryId":18,"isFree":28,"price":6,"currency":29},454338,"مواقع تحت الهجوم","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002Fbulk-covers\u002Fegb120332-5120792.webp",0,461,true,"USD",{"id":31,"title":32,"coverUrl":33,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":34,"categoryId":18,"isFree":28,"price":6,"currency":29},454303,"أنظمة تحت الهجوم \"تخطى كل الصلاحيات وكلمات المرور للنظام\"","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002Fbulk-covers\u002Fegb126036-5129876.webp",468,{"id":36,"title":37,"coverUrl":38,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":39,"categoryId":18,"isFree":28,"price":6,"currency":29},454292,"الهجوم صفر \"فنون وخدع الهاكرز (للمبتدئين) التعريف والمفهوم والتطبيق\"","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002Fbulk-covers\u002Fegb126032-5129879.webp",409,{"id":41,"title":42,"coverUrl":43,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":44,"categoryId":14,"isFree":28,"price":6,"currency":29},194992,"الهجوم صفر... فنون وخدع الهاكرز (للمبتدئين) التعريف والمفهوم والتطبيق","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_1949922994911400733062.gif",384,{"id":46,"title":47,"coverUrl":48,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":49,"categoryId":14,"isFree":28,"price":6,"currency":29},163248,"برمجة الأجهزة الكفية والهواتف المحمولة","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_163248842361.gif",316,{"id":51,"title":52,"coverUrl":53,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":54,"categoryId":14,"isFree":28,"price":6,"currency":29},163237,"برمجة أجهزة الإنذار والتحكم","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_163237732361.gif",366,{"id":56,"title":57,"coverUrl":58,"ratingsCount":26,"readsCount":10,"reviewsCount":26,"views":59,"categoryId":14,"isFree":28,"price":6,"currency":29},158321,"visual basic 2008","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_158321123851.gif",457,{"id":61,"title":62,"coverUrl":63,"ratingsCount":26,"readsCount":26,"reviewsCount":26,"views":64,"categoryId":14,"isFree":28,"price":6,"currency":29},155744,"التحكم الكامل أجهزة تحت الهجوم","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_155744447551.gif",379,{"id":66,"title":67,"coverUrl":68,"ratingsCount":26,"readsCount":20,"reviewsCount":26,"views":69,"categoryId":14,"isFree":28,"price":6,"currency":29},155743,"شبكات تحت الهجوم... الإختراق والخدع للشبكات السلكية واللاسلكية","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_155743347551.gif",488,{"id":71,"title":72,"coverUrl":73,"ratingsCount":26,"readsCount":10,"reviewsCount":26,"views":74,"categoryId":14,"isFree":28,"price":6,"currency":29},155742,"الحماية... كيف تحمى نفسك من هجمات الهاكرز","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_155742247551.gif",463,{"id":76,"title":77,"coverUrl":78,"ratingsCount":26,"readsCount":10,"reviewsCount":26,"views":79,"categoryId":14,"isFree":28,"price":6,"currency":29},155741,"الرزالة والهجوم... احذر ثغرات البرامج","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_155741147551.gif",532,{"id":81,"title":82,"coverUrl":83,"ratingsCount":26,"readsCount":20,"reviewsCount":26,"views":84,"categoryId":14,"isFree":28,"price":6,"currency":29},155740,"أنظمة تحت الهجوم... تخطى كل الصلاحيات وكلمات المرور للنظام","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_155740047551.gif",586]