資訊安全
相關書籍
-
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Identity & Access Management: A Systems Engineering Approach$1,300$1,274 -
VIP 95折
Trust in Social Media (Synthesis Lectures on Information Security, Privacy, & Trust)$1,690$1,605 -
Encryption$1,180$1,156 -
80折
$1,320Collaboration with Cloud Computing: Security, Social Media, and Unified Communications (Paperback) -
VIP 95折
Information Protection in Times of Crisis: A Practical, Effective, and Inexpensive Approach$3,100$2,945 -
VIP 95折
Program Transformation Techniques for Enhancing Software Security (Synthesis Lectures on Information Security, Privacy, and Trust)$1,540$1,463 -
Cryptography and Secure Communication$4,890$4,792 -
Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity$3,060$2,998 -
VIP 95折
Trust, Computing, and Society$3,520$3,344 -
VIP 95折
Network Security Through Data Analysis: Building Situational Awareness (Paperback)$1,650$1,567 -
International Telecommunications Law$1,300$1,274 -
VIP 95折
Reversible Digital Watermarking: Theory and Practices (Synthesis Lectures on Information Security, Privacy, and Trust)$1,540$1,463 -
NIST Interagency Report 7697: Common Platform Enumeration Dictionary Specification Version 2.3$840$823 -
Theory of Cryptography: 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value$2,080$2,038 -
Introduction to Public Key Technology and the Federal PKI Infrastructure$710$695 -
VIP 95折
Authority Based Access Control: Securing Life Online and Open Social Networking$3,100$2,945 -
VIP 95折
Corporate Computer Security$7,490$7,115 -
Cybersecurity and Cyberwar: What Everyone Needs to Know(r)$830$813 -
Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities$4,910$4,811 -
NTRU Cryptography: A Lattice-Based Cryptosystem and Attacks against it$1,560$1,528 -
VIP 95折
Securing Web Applications$3,100$2,945 -
Building an Information Technology Security Awareness and Training Program$780$764 -
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)$780$764 -
A Framework for Designing Cryptographic Key Management Systems$810$793 -
VIP 95折
Identity and Access Management: Business Performance Through Connected Intelligence$2,280$2,166 -
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud (Auerbach Book)$3,690$3,616 -
Core Software Security: Security at the Source (Hardcover)$7,200$7,056 -
Introduction to Public Key Infrastructures$3,760$3,684