資訊安全
相關書籍
-
90折
$3,510ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Paperback) -
85折
$1,828Black Hat Graphql: Attacking Next Generation APIs -
80折
$1,720IAPP CIPM Certified Information Privacy Manager Study Guide -
80折
$1,760CISM Certified Information Security Manager All-In-One Exam Guide, Second Edition, 2/e (Paperback) -
80折
$1,264Model-Driven Devops: Increasing Agility and Security in Your Physical Network Through Devops (Paperback) -
95折
$1,121Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures -
80折
$1,960IT Security Controls: A Guide to Corporate Standards and Frameworks -
95折
$1,425The Devops Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations, 2/e (Paperback) -
80折
$1,960Comptia Security+ Certification Bundle, 4/e (Exam Sy0-601) (Paperback) -
70折
$980Ceh V11: Certified Ethical Hacker Version 11 Practice Tests -
80折
$1,400Comptia Security+ Certification Study Guide, 4/e (Exam Sy0-601) (Paperback) -
85折
$3,383Game Theory and Machine Learning for Cyber Security -
80折
$1,520CEH V11 Certified Ethical Hacker Study Guide (Paperback) -
85折
$3,273The Wiley 5g Ref: Security(美國原版) -
50折
$1,400The Official (ISC)2 CCSP CBK Reference, 3/e (Hardcover) -
90折
$1,436Kali Linux Penetration Testing Bible -
90折
$2,466Boolean Functions for Cryptography and Coding Theory -
80折
$1,400Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security 2/e -
60折
$708Comptia Security+ Certification Practice Exams, 4/e (Exam Sy0-601) (Paperback) -
85折
$1,938Threat Modeling: A Practical Guide for Development Teams (Paperback) -
60折
$1,260CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) 2nd Edition -
80折
$2,112Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .Net -
90折
$1,242Identity Management with Biometrics -
80折
$2,080The Science of Quantitative Information Flow -
80折
$1,216Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk -
80折
$2,384Guide to Computer Network Security -
80折
$1,680Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications -
80折
$1,480Building an Anonymization Pipeline: Creating Safe Data -
80折
$816Penetration Testing for Dummies -
85折
$1,683Web Application Security: Exploitation and Countermeasures for Modern Web Applications