資訊安全
相關書籍
-
25折
$399Guide to Tactical Perimeter Defense -
17折
$399EnCase Computer Forensics--The Official EnCE: EnCase Certified Examiner Study Guide, 2/e -
50折
$800Web 2.0 Security - Defending AJAX, RIA, AND SOA -
60折
$1,188Open Source Fuzzing Tools (Paperback) -
50折
$750Dr. Tom Shinder's ISA Server 2006 Migration Guide (Paperback) -
50折
$900Perl Scripting for Windows Security -
50折
$990Penetration Tester's Open Source Toolkit, Volume 2 -
27折
$399Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Hardcover)(書況舊有褪色及黴斑,不介意在下單) -
17折
$399CISSP All-In-One Certification Exam Guide, 4/e (Hardcover) -
50折
$1,490Information Assurance: Dependability and Security in Networked Systems -
50折
$990InfoSecurity 2008 Threat Analysis -
50折
$990Kismet Hacking -
50折
$1,020The Best Damn Cybercrime and Forensics Book Period -
24折
$399How to Cheat at Securing Your Network -
50折
$990TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook (Paperback) -
50折
$990Practical Embedded Security: Building Secure Resource-Constrained Systems -
50折
$1,020AVIEN Malware Defense Guide for the Enterprise -
16折
$399CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), 4/e -
50折
$1,175Digital CCTV: A Security Professional's Guide (Hardcover) -
17折
$299Securing Ajax Applications: Ensuring the Safety of the Dynamic Web -
50折
$900PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance (Paperback) -
80折
$1,728Virtual Honeypots: From Botnet Tracking to Intrusion Detection -
50折
$825Asterisk Hacking (Paperback) -
50折
$975Security Convergence: Managing Enterprise Security Risk -
50折
$1,990Network Security: Current Status and Future Directions (Hardcover) -
50折
$990Alternate Data Storage Forensics -
60折
$1,188Security+ Study Guide, 2/e (Paperback) -
50折
$1,050Windows Forensic Analysis DVD Toolkit (Paperback) -
28折
$399Security Design Consulting: The Business of Security System Design -
50折
$990Physical and Logical Security Convergence: Powered By Enterprise Security Management