資訊安全
相關書籍
-
90折
$2,376Real Digital Forensics: Computer Security and Incident Response -
80折
$1,680Business Continuity and Disaster Recovery for InfoSec Managers (Paperback) -
80折
$791The Official Robosapien Hacker's Guide -
50折
$620Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications -
50折
$900Network Security Evaluation Using the NSA IEM -
20折
$199Hacking Movable Type -
50折
$850Extreme Exploits : Advanced Defenses Against Hardcore Hacks -
80折
$1,680RFID : Applications, Security, and Privacy (Hardcover) -
17折
$399Network Defense and Countermeasures: Principles and Practices (Paperback) -
22折
$399Sun Certified Security Administrator for Solaris 10 Study Guide (Paperback) -
60折
$1,788Reliability, Maintainability and Risk: Practical Methods for Engineers including Reliability Centred Maintenance and Safety-Related Systems, 7/e -
80折
$1,832Bulletproof Wireless Security: GSM, UMTS, 802.11 and Ad Hoc Security -
19折
$199Phishing: Cutting the Identity Theft Line -
23折
$199Hacking GPS (ExtremeTech) -
28折
$399Computer Security Fundamentals (Paperback) -
60折
$948The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers (Hardcover) -
50折
$775Black Hat Physical Device Security -
50折
$620Cyber Spying: Tracking Your Family's (sometimes) Secret Online Lives -
50折
$825Intrusion Prevention And Active Response: Deploying Network And Host Ips -
90折
$1,485Forensic Discovery (Hardcover) -
23折
$399Computer Forensics: Computer Crime Scene Investigation, 2/e -
60折
$816Buffer Overflow Attacks -
23折
$399Programmer's Ultimate Security DeskRef -
27折
$399Hacking Exposed Computer Forensics (Paperback) -
27折
$399Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code (Paperback) -
50折
$600Exploring Crime Analysis: Readings on Essential Skills (Paperback) -
50折
$375Security+ Exam Cram 2 Lab Manual (Paperback) -
50折
$495High-Tech Crimes Revealed: Cyberwar Stories From The Digital Front -
50折
$990Mobile Ad Hoc Networking (Hardcover) -
80折
$1,980The Tao Of Network Security Monitoring: Beyond Intrusion Detection