資訊安全
相關書籍
-
VIP 95折
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control$3,380$3,211 -
Ensuring the Integrity of Electronic Health Records: The Best Practices for E-records Compliance$3,040$2,979 -
Multimedia Security Handbook$3,500$3,430 -
90折
$1,350Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps -
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption$8,920$8,741 -
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption$1,970$1,930 -
Theory of Cryptography: 18th International Conference, Tcc 2020, Durham, Nc, Usa, November 16-19, 2020, Proceedings, Part I$2,430$2,381 -
Theory of Cryptography: 18th International Conference, Tcc 2020, Durham, Nc, Usa, November 16-19, 2020, Proceedings, Part III$4,530$4,439 -
Theory of Cryptography: 18th International Conference, Tcc 2020, Durham, Nc, Usa, November 16-19, 2020, Proceedings, Part II$2,430$2,381 -
Authentication and Access Control: Practical Cryptography Methods and Tools$1,925$1,886 -
Cybersecurity for Everyone$3,040$2,979 -
VIP 90折
API Security in Action (Paperback)$2,327$2,205 -
VIP 95折
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition)$1,140$1,083 -
Emerging Technologies for Authorization and Authentication: Third International Workshop, Etaa 2020, Guildford, Uk, September 18, 2020, Proceedings$2,430$2,381 -
VIP 95折
Geekonomics: The Real Cost of Insecure Software (Paperback)$1,450$1,377 -
Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity$920$901 -
VIP 95折
Practical Cybersecurity Architecture$2,150$2,042 -
Cybersecurity in Humanities and Social Sciences: A Research Methods Approach$6,370$6,242 -
Cloud Computing Security: Foundations and Challenges$7,210$7,065 -
VIP 95折
Cloud Computing Security: Foundations and Challenges$3,460$3,287 -
Graphical Models for Security: 7th International Workshop, Gramsec 2020, Boston, Ma, Usa, June 22, 2020, Revised Selected Papers$2,430$2,381 -
Instructions for integrating logsource into SIEM Qradar$1,630$1,597 -
Model-Driven Simulation and Training Environments for Cybersecurity: Second International Workshop, Mstec 2020, Guildford, Uk, September 14-18, 2020,$2,430$2,381 -
Telematics and Computing: 9th International Congress, Witcom 2020, Puerto Vallarta, Mexico, November 2-6, 2020, Proceedings$2,430$2,381 -
European Constitutional Courts Towards Data Retention Laws$6,820$6,683 -
Security, Privacy and User Interaction$2,430$2,381 -
EU General Data Protection Regulation (GDPR): An implementation and compliance guide$2,180$2,136 -
Lattice-Based Cryptosystems: A Design Perspective$6,820$6,683 -
Visual Privacy Management: Design and Applications of a Privacy-Enabling Platform$2,430$2,381 -
80折
$880Practical Vulnerability Management (Paperback)