資訊安全
相關書籍
-
VIP 95折
The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development (Internal Audit and IT Audit)$6,330$6,013 -
Cybersecurity: Geopolitics, Law, and Policy$10,450$10,241 -
Lightweight Cryptography for Security and Privacy: 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet (Lecture Notes in Computer Science)$2,430$2,381 -
Cybersecurity: Geopolitics, Law, and Policy$2,880$2,822 -
Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, ... Part I (Lecture Notes in Computer Science)$2,570$2,441 -
VIP 95折
Physical Security Protection Systems: Implementation and Operation$2,580$2,451 -
Electronic Voting: First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
KISH CYPHER, THE: THE STORY OF KLJN FOR UNCONDITIONAL SECURITY$6,750$6,615 -
Guide to Pairing-Based Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)$5,480$5,370 -
Biometrics in Support of Military Operations: Lessons from the Battlefield$7,970$7,810 -
VIP 95折
Homeland Security: An Introduction to Principles and Practice, (Third Edition)(Hardcover)$4,600$4,370 -
VIP 95折
The Data Protection Officer(Hardcover)$2,450$2,327 -
VIP 95折
Mobile Device Management and Strategy$2,750$2,612 -
Security for Wireless Sensor Networks using Identity-Based Cryptography( Paperback)$2,880$2,822 -
Information Security Management Handbook, (Sixth Edition), Volume 6(paperback)$2,880$2,822 -
Noiseless Steganography: The Key to Covert Communications$3,270$3,204 -
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I (Lecture Notes in Computer Science)$2,430$2,381 -
Future Data and Security Engineering: Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)$4,620$4,527 -
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (Advances in Intelligent Systems and Computing)$8,730$8,555 -
A Fresh Look at Mobile Security$1,610$1,577 -
VIP 95折
Building a Practical Information Security Program$2,600$2,470 -
VIP 95折
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems$6,840$6,498 -
VIP 95折
Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 ... in Information and Communication Technology)$2,570$2,441 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications$3,400$3,332 -
The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War$1,850$1,813 -
Cyber Warfare: Building the Scientific Foundation (Advances in Information Security)$5,670$5,556