資訊安全
相關書籍
-
Introduction to Cryptographic Definitions: A Step-By-Step Guide for Beginners$2,660$2,606 -
VIP 95折
Information Security and Cryptology - Icisc 2024: 27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers$4,000$3,800 -
Hci for Cybersecurity, Privacy and Trust: 7th International Conference, Hci-CPT 2025, Held as Part of the 27th Hci International Conference, Hcii 2025$2,460$2,410 -
Smart Card Authentication: Concepts, Protocols, and Deployment$730$715 -
VIP 95折
Hci for Cybersecurity, Privacy and Trust: 7th International Conference, Hci-CPT 2025, Held as Part of the 27th Hci International Conference, Hcii 2025$3,600$3,420 -
95折
$1,995Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback) -
Fighting the Virus: How Disease Modeling Can Enhance Cybersecurity$4,520$4,429 -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
Social Cyber Engineering and Advanced Security Algorithms$5,680$5,396 -
VIP 95折
AI-Centric Modeling and Analytics: Concepts, Technologies, and Applications$2,620$2,489 -
Code-Based Cryptography: 12th International Workshop, Cbcrypto 2024, Zurich, Switzerland, May 25-26, 2024, Revised Selected Papers$4,990$4,890 -
Digital Forensics and Cyber Crime: 15th Eai International Conference, Icdf2c 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II$2,850$2,793 -
VIP 95折
Optimal Spending on Cybersecurity Measures: AI and Governance$2,560$2,432 -
VIP 95折
Optimal Spending on Cybersecurity Measures: AI and Governance$5,370$5,101 -
Security and Privacy: 3rd International Conference, Icsp 2024, Jamshedpur, India, November 20-21, 2024, Proceedings$2,850$2,793 -
An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS$890$872 -
VIP 95折
Privacy and Identity Management. Generating Futures: 19th Ifip Wg 9.6/11.7 and Ifip Wg 11.6 International Summer School, Privacy and Identity 2024, Ma$3,900$3,705 -
Ubiquitous Security: 4th International Conference, Ubisec 2024, Changsha, China, December 29-31, 2024, Revised Selected Papers$5,890$5,772 -
VIP 95折
Swarm Intelligence: Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security$5,680$5,396 -
Public-Key Cryptography - Pkc 2025: 28th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 20$2,850$2,793 -
Public-Key Cryptography - Pkc 2025: 28th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 20$5,760$5,644 -
Public-Key Cryptography - Pkc 2025: 28th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 20$3,430$3,361 -
VIP 95折
Security Issues in Communication Devices, Networks and Computing Models: Volume 2$5,520$5,244 -
VIP 95折
Security Issues in Communication Devices, Networks and Computing Models: Volume 1$5,520$5,244 -
VIP 95折
Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation$8,270$7,856 -
Cyber Security ISO 27001: 2022 Certification$990$970 -
Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part$3,900$3,822 -
Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part$8,270$8,104 -
VIP 95折
Digital Resilience: Navigating Disruption and Safeguarding Data Privacy$8,270$7,856 -
VIP 95折
Innovation in Healthtech: A Roadmap for Empowering Healthcare$5,990$5,690