資訊安全
相關書籍
-
Smart Card Security: Applications, Attacks, and Countermeasures$3,270$3,204 -
Transformation of Cryptography$670$656 -
Cybersecurity of Industrial Systems$6,370$6,242 -
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT$6,370$6,242 -
It's Just Your Password Dumb Ass$580$568 -
Don't You Dare Forget Me!: Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift Kitten/Cat Lovers$600$588 -
Code-Based Cryptography: 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers$2,430$2,381 -
Computer Security: Principles and Practice$5,440$5,331 -
Developments and Advances in Defense and Security: Proceedings of Micrads 2019$8,730$8,555 -
Hci for Cybersecurity, Privacy and Trust: First International Conference, Hci-CPT 2019, Held as Part of the 21st Hci International Conference, Hcii 20$2,430$2,381 -
VIP 95折
Privacy Technologies and Policy: 7th Annual Privacy Forum, Apf 2019, Rome, Italy, June 13-14, 2019, Proceedings$2,570$2,441 -
VIP 95折
Security and Privacy in New Computing Environments: Second Eai International Conference, Spnce 2019, Tianjin, China, April 13-14, 2019, Proceedings$2,570$2,441 -
VIP 95折
The Chief Security Officer's Handbook: Leading Your Team Into the Future$4,400$4,180 -
60折
$1,188Mastering Malware Analysis -
Advances in Human Factors in Cybersecurity: Proceedings of the Ahfe 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019,$6,820$6,683 -
VIP 95折
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data: 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Interna$3,160$3,002 -
Emerging Security Algorithms and Techniques$7,590$7,438 -
Information Security and Privacy: 24th Australasian Conference, Acisp 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings$4,150$4,067 -
VIP 95折
Cybersecurity: The Beginner's Guide$2,150$2,042 -
VIP 95折
Cybersecurity Awareness Among Students and Faculty$3,200$3,040 -
VIP 95折
Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation$2,960$2,812 -
50折
$1,575The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition -
VIP 95折
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats$1,750$1,662 -
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data: 13th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 Interna$3,570$3,498 -
VIP 95折
Cyber Security Intelligence and Analytics$4,890$4,645 -
VIP 95折
Practical Cloud Security (Paperback)$1,990$1,890 -
Rewired: Cybersecurity Governance$2,900$2,842 -
Strategic Security: Forward Thinking for Successful Executives$6,820$6,683 -
Security with Intelligent Computing and Big-Data Services: Proceedings of the Second International Conference on Security with Intelligent Computing a$8,780$8,604 -
Fully Homomorphic Encryption in Real World Applications$6,820$6,683