資訊安全
相關書籍
-
VIP 95折
Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes$2,260$2,147 -
VIP 95折
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine$1,870$1,777 -
VIP 95折
Trust, Privacy, and Security in Digital Business: 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ... Computer Science / Security and Cryptology)$2,410$2,290 -
80折
$1,920Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications (Paperback) -
VIP 95折
Iso27001 in a Windows Environment$2,390$2,271 -
VIP 95折
Cybersecurity, Innovation and the Internet Economy$810$770 -
VIP 95折
Cybersecurity: Being Cyber Aware and Cyber Safe (Mini-book Strategy Series) (Volume 2)$810$770 -
VIP 95折
Securing Digital Video: Techniques for DRM and Content Protection$5,330$5,064 -
VIP 95折
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century (Hardcover)$3,820$3,629 -
VIP 95折
Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework (Springer Theses)$4,590$4,361 -
VIP 95折
CompTIA Security+ SY0-401 Authorized Cert Guide, Deluxe Edition, 3/e(Hardcover)$2,040$1,938 -
80折
$1,960Digital Video Surveillance and Security, 2/e (Paperback) -
VIP 95折
Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, ... (Lecture Notes in Computer Science)$2,460$2,337 -
VIP 95折
Trust and Trustworthy Computing: 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)$2,410$2,290 -
VIP 95折
Inside Worry Free Business Security 9.0 with Exchange$1,530$1,454 -
VIP 95折
Inside OfficeScan 11 with Control Manager 6.1$1,950$1,853 -
VIP 95折
Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Hardcover)$3,980$3,781 -
VIP 95折
A Cryptography Primer: Secrets and Promises$7,930$7,534 -
VIP 95折
Cyberterrorism: Understanding, Assessment, and Response$4,500$4,275 -
VIP 95折
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Lecture Notes in Computer Science)$2,460$2,337 -
VIP 95折
Electronic Identity (SpringerBriefs in Cybersecurity)$2,410$2,290 -
VIP 95折
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records$3,360$3,192 -
VIP 95折
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice$1,450$1,378 -
VIP 95折
Protection of Information and the Right to Privacy - A New Equilibrium? (Law, Governance and Technology Series)$7,020$6,669 -
VIP 95折
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers$2,800$2,660 -
VIP 95折
Progress in Cryptology - AFRICACRYPT 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Identity & Access Management: A Systems Engineering Approach$1,290$1,226 -
VIP 95折
Trust in Social Media (Synthesis Lectures on Information Security, Privacy, & Trust)$1,680$1,596 -
VIP 95折
Encryption$1,170$1,112