資訊安全
相關書籍
-
The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies$4,620$4,527 -
Information Security JumpStart Guide$670$656 -
CPTED and Traditional Security Countermeasures: 150 Things You Should Know$4,340$4,253 -
Cpted and Traditional Security Countermeasures: 150 Things You Should Know$10,450$10,241 -
VIP 95折
Windows Security Monitoring: Scenarios and Patterns$1,750$1,662 -
Advances in Data and Information Sciences: Proceedings of ICDIS-2017, Volume 1 (Lecture Notes in Networks and Systems)$7,970$7,810 -
Privacy’s Blueprint: The Battle to Control the Design of New Technologies$1,600$1,568 -
Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings (Lecture Notes in Computer Science)$3,530$3,459 -
VIP 95折
Technology and the Intelligence Community: Challenges and Advances for the 21st Century (Advanced Sciences and Technologies for Security Applications)$6,680$6,346 -
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Security with Intelligent Computing and Big-data Services (Advances in Intelligent Systems and Computing)$2,430$2,381 -
VIP 95折
Access to Online Resources: A Guide for the Modern Librarian$2,770$2,631 -
Cyber Security for Cyber Physical Systems (Studies in Computational Intelligence)$7,970$7,810 -
Transactions on Computational Science XXXII: Special Issue on Cybersecurity and Biometrics (Lecture Notes in Computer Science)$2,430$2,381 -
Dynamic Games for Network Security (SpringerBriefs in Electrical and Computer Engineering)$2,430$2,381 -
VIP 95折
CCSP Certified Cloud Security Professional Practice Exams$1,540$1,463 -
Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, ... Part II (Lecture Notes in Computer Science)$2,430$2,381 -
FireEye Deployment Made Easy$880$862 -
Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,620$2,567 -
The GnuTLS 3.6.1 Manual$1,010$989 -
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys$1,240$1,215 -
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 6/e (Paperback)$1,790$1,754 -
Mobile Internet Security: First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers (Communications in Computer and Information Science)$2,430$2,381 -
Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Smart Trends in Systems, Security and Sustainability: Proceedings of WS4 2017 (Lecture Notes in Networks and Systems)$6,820$6,683 -
VIP 95折
Smart Computing and Informatics: Proceedings of the First International Conference on SCI 2016, Volume 1 (Smart Innovation, Systems and Technologies)$9,020$8,569 -
Women in Security: Changing the Face of Technology and Innovation (Women in Engineering and Science)$5,290$5,184 -
Methods for Location Privacy: A Comparative Overview (Foundations and Trends(r) in Privacy and Security)$2,360$2,312 -
VIP 95折
Information Security Handbook$1,810$1,719 -
VIP 95折
Empirical Research for Software Security: Foundations and Experience (Series in Security, Privacy and Trust)$6,580$6,251