資訊安全
相關書籍
-
Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Lecture ... Computer Science / Security and Cryptology)$2,470$2,420 -
Privacy vs. Security (SpringerBriefs in Cybersecurity)$2,430$2,381 -
80折
$1,720Integrated Security Systems Design, 2/e : A Complete Reference for Building Enterprise-Wide Digital Security Systems (Hardcover) -
Symmetric Cryptographic Protocols$4,530$4,439 -
Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes$2,270$2,224 -
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine$1,890$1,852 -
Trust, Privacy, and Security in Digital Business: 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ... Computer Science / Security and Cryptology)$2,430$2,381 -
80折
$1,920Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications (Paperback) -
Iso27001 in a Windows Environment$2,410$2,361 -
Cybersecurity, Innovation and the Internet Economy$810$793 -
Cybersecurity: Being Cyber Aware and Cyber Safe (Mini-book Strategy Series) (Volume 2)$810$793 -
Securing Digital Video: Techniques for DRM and Content Protection$5,370$5,262 -
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century (Hardcover)$3,840$3,763 -
Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework (Springer Theses)$4,620$4,527 -
VIP 95折
CompTIA Security+ SY0-401 Authorized Cert Guide, Deluxe Edition, 3/e(Hardcover)$2,060$1,957 -
80折
$1,960Digital Video Surveillance and Security, 2/e (Paperback) -
Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, ... (Lecture Notes in Computer Science)$2,470$2,420 -
Trust and Trustworthy Computing: 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)$2,430$2,381 -
Inside Worry Free Business Security 9.0 with Exchange$1,540$1,509 -
Inside OfficeScan 11 with Control Manager 6.1$1,960$1,920 -
Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Hardcover)$4,010$3,929 -
VIP 95折
A Cryptography Primer: Secrets and Promises$7,980$7,581 -
Cyberterrorism: Understanding, Assessment, and Response$4,530$4,439 -
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Lecture Notes in Computer Science)$2,470$2,420 -
Electronic Identity (SpringerBriefs in Cybersecurity)$2,430$2,381 -
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records$3,380$3,312 -
VIP 95折
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice$1,460$1,387 -
VIP 95折
Protection of Information and the Right to Privacy - A New Equilibrium? (Law, Governance and Technology Series)$7,070$6,716 -
VIP 95折
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers$2,820$2,679 -
Progress in Cryptology - AFRICACRYPT 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (Lecture Notes in Computer Science)$2,430$2,381