資訊安全
相關書籍
-
Proceedings of the Second International Conference on Advances in Computing Research (Acr'24)$11,030$10,809 -
Developments and Advances in Defense and Security: Micrads 2023$11,790$11,554 -
Progress in Cryptology - Indocrypt 2023: 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I$3,570$3,498 -
Progress in Cryptology - Indocrypt 2023: 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II$3,000$2,940 -
VIP 95折
Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture$1,890$1,795 -
VIP 95折
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture$2,160$2,052 -
Cyber Resilience Fundamentals$3,760$3,684 -
VIP 95折
Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies$11,270$10,706 -
80折
$1,568Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware (Paperback) -
Why CISOs Fail$6,820$6,683 -
Applied Cryptography and Network Security: 22nd International Conference, Acns 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Pa$3,760$3,684 -
Applied Cryptography and Network Security: 22nd International Conference, Acns 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Pa$3,760$3,684 -
Applied Cryptography and Network Security: 22nd International Conference, Acns 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Pa$5,670$5,556 -
VIP 95折
Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security$1,910$1,814 -
VIP 95折
Cybersecurity: A Communication Perspective for the Next Generation Network$3,670$3,486 -
The Dual-Edged Sword: Generative AI in Cybersecurity$1,140$1,117 -
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You$6,820$6,683 -
VIP 95折
In Zero Trust We Trust$1,685$1,600 -
VIP 95折
Cisco Certified Support Technician (Ccst) Cybersecurity 100-160 Official Cert Guide$1,900$1,805 -
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You$2,920$2,861 -
Multimedia Watermarking: Latest Developments and Trends$6,820$6,683 -
VIP 95折
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals$1,690$1,605 -
See Yourself in Cyber: Security Careers Beyond Hacking$1,160$1,136 -
Cybersecurity Challenges in the Age of Ai, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safe$7,200$7,056 -
Selected Areas in Cryptography - Sac 2023: 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers$3,760$3,684 -
Privacy Computing: Theory and Technology$7,970$7,810 -
Computational Sciences and Sustainable Technologies: First International Conference, Iccsst 2023, Bangalore, India, May 8-9, 2023, Revised Selected Pa$4,150$4,067 -
ISO 27001: Information Security Management System requirements Lead Auditor Mastery for Business Success "Simplified ISO 27001: A$2,440$2,391 -
VIP 95折
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS$1,840$1,748 -
Computing and Informatics: 9th International Conference, Icoci 2023, Kuala Lumpur, Malaysia, September 13-14, 2023, Revised Selected Papers, Part$3,760$3,684