[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fRDnFLxAaTLOSLnmNrBOTJ6WuCuGDws9-z_X9zHPP1Zk":3,"$fDKbYWfMWm5UzPisnr2fEvWUIbTAfUohzvbMPzC9nP78":84},{"id":4,"title":5,"visible":6,"description":7,"coverUrl":8,"pageCount":9,"publishYear":10,"isbn":11,"language":12,"avgRating":13,"ratingsCount":6,"reviewsCount":14,"readsCount":15,"views":16,"shelvesCount":15,"hasEbook":17,"ebookType":18,"visibleEbook":14,"hasEpub":17,"epubUrl":18,"author":19,"translators":18,"editors":18,"category":22,"publisher":25,"publishers":28,"reviews":30,"authorBio":18,"quotes":31,"relatedBooks":32},165246,"أسس الأمان في PHP",1,"يشرح هذا الكتاب أكثر أنواع الهجوم شهرة على تطبيقات الويب المكتوبة بلغة PHP كما يشرح كيفية كتابة شيفرة يمكنها التصدي لهذه الهجومات.\r\n\r\nاذ ستجد فيه المواضيع الأساسية التالية : \r\n\r\n* الحماية من نقاط ضعف البرمجة العامة (XSS)\r\n* الحماية من هجوم حقن SQL\r\n* الحماية من محاولات سرقة جلسة العمل\r\n* الحماية من هجوم حقن الأوامر\r\n* الحماية من سرقة ملفات تعريف الإرتباط\r\n* المصادقة و التخويل\r\n\r\nوغيرها الكثير...","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F400x600\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_165246642561.gif",136,2007,"0","عربي",4,0,2,687,false,null,{"id":20,"nameAr":21},19850,"محمد شيخو معمو",{"id":23,"nameAr":24},7,"تكنولوجيا و إنترنت",{"id":26,"nameAr":27},2129,"شعاع للنشر والعلوم",[29],{"id":26,"nameAr":27},[],[],[33,40,46,53,60,66,72,79],{"id":34,"title":35,"coverUrl":36,"authorName":37,"avgRating":38,"views":39},165229,"تعلم Solid Works 2011 خطوة خطوة","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_165229922561.gif","مصطفى أبو صبيح",3.9,8544,{"id":41,"title":42,"coverUrl":43,"authorName":44,"avgRating":13,"views":45},165241,"تحليل وتصميم نظم المعلومات المحاسبية  Analyses And Design of Accounting Information Systems","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_165241142561.gif","عبد الرزاق محمد قاسم",6144,{"id":47,"title":48,"coverUrl":49,"authorName":50,"avgRating":51,"views":52},154273,"التشريعات الإجتماعية (الاسرة -  الطفل - المعاقين العمل - الأحداث)","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_154273372451.gif","محمد سيد فهمى",3.3,5723,{"id":54,"title":55,"coverUrl":56,"authorName":57,"avgRating":58,"views":59},195400,"الحاسوب والبرمجيات الجاهزة\u002F مهارات الحاسوب \u002F عربي- انجليزي","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_1954000045911400733473.gif","محمد بلال الزعبي، منيب قطيشات، احمد الشرايعة",3,3943,{"id":61,"title":62,"coverUrl":63,"authorName":64,"avgRating":38,"views":65},158316,"من الصفر إلى الاحتراف برمجة قواعد البيانات في فيجوال بيسك دوت نت 2010","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_158316613851.gif","محمد حمدى غانم",3336,{"id":67,"title":68,"coverUrl":69,"authorName":70,"avgRating":58,"views":71},164400,"الوعي المعلوماتي ومهاراته لدى الأفراد","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_164400004461.gif","أمنية خير توفيق",2193,{"id":73,"title":74,"coverUrl":75,"authorName":76,"avgRating":77,"views":78},154140,"المحاسبة الإدارية الاستراتيجية","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_154140041451.gif","محمد الفيومي محمد",3.7,1950,{"id":80,"title":81,"coverUrl":18,"authorName":82,"avgRating":14,"views":83},30295,"استخدام الحاسوب والانترنت في ميادين التربية والتعليم","جودت أحمد سعادة",1947,{"books":85},[86,88,90,98,105,111,117,118],{"id":34,"title":35,"coverUrl":36,"authorName":37,"ratingsCount":23,"readsCount":87,"views":39},16,{"id":47,"title":48,"coverUrl":49,"authorName":50,"ratingsCount":15,"readsCount":89,"views":52},15,{"id":91,"title":92,"coverUrl":93,"authorName":94,"ratingsCount":95,"readsCount":96,"views":97},165262,"النظرية الاحتسابية THEORY OF COMPUTATION","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_165262262561.gif","طارق الشيخ مجيد",5,14,1626,{"id":99,"title":100,"coverUrl":101,"authorName":102,"ratingsCount":95,"readsCount":103,"views":104},187029,"نظم المعلومات ماهيتها ومكوناتها","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_187029920781.gif","عماد الصباغ",10,852,{"id":106,"title":107,"coverUrl":108,"authorName":109,"ratingsCount":13,"readsCount":103,"views":110},184258,"تعلم واحترف Java بسهولة","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_184258852481.gif","عزب محمد عزب",1310,{"id":112,"title":113,"coverUrl":114,"authorName":102,"ratingsCount":58,"readsCount":115,"views":116},187033,"تطبيقات الحاسوب في نظم المعلومات","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_187033330781.gif",8,791,{"id":61,"title":62,"coverUrl":63,"authorName":64,"ratingsCount":58,"readsCount":23,"views":65},{"id":119,"title":120,"coverUrl":121,"authorName":122,"ratingsCount":14,"readsCount":123,"views":124},30228,"القرصنة الفنون الأساليب و التدابير","https:\u002F\u002Fcdn.raffy.me\u002Fresize\u002F200x300\u002FBooks\u002FJun11Feb16\u002Fraffy.ws_5e9igec87.jpg","نجوى الخباز",6,976]