資訊安全
相關書籍
-
VIP 95折
Privacy’s Blueprint: The Battle to Control the Design of New Technologies$1,590$1,511 -
VIP 95折
Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings (Lecture Notes in Computer Science)$3,510$3,335 -
VIP 95折
Technology and the Intelligence Community: Challenges and Advances for the 21st Century (Advanced Sciences and Technologies for Security Applications)$6,630$6,299 -
VIP 95折
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Security with Intelligent Computing and Big-data Services (Advances in Intelligent Systems and Computing)$2,410$2,290 -
VIP 95折
Access to Online Resources: A Guide for the Modern Librarian$2,750$2,613 -
VIP 95折
Cyber Security for Cyber Physical Systems (Studies in Computational Intelligence)$7,920$7,524 -
VIP 95折
Transactions on Computational Science XXXII: Special Issue on Cybersecurity and Biometrics (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Dynamic Games for Network Security (SpringerBriefs in Electrical and Computer Engineering)$2,410$2,290 -
VIP 95折
CCSP Certified Cloud Security Professional Practice Exams$1,530$1,454 -
79折
$322碼書 : 編碼與解碼的戰爭 -
VIP 95折
Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, ... Part II (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
FireEye Deployment Made Easy$880$836 -
VIP 95折
Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,600$2,470 -
VIP 95折
The GnuTLS 3.6.1 Manual$1,000$950 -
VIP 95折
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys$1,230$1,169 -
VIP 95折
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 6/e (Paperback)$1,780$1,691 -
78折
秋聲教你學資訊安全與駭客技術:反組譯工具的使用導向$620$484 -
VIP 95折
Mobile Internet Security: First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers (Communications in Computer and Information Science)$2,410$2,290 -
VIP 95折
Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Smart Trends in Systems, Security and Sustainability: Proceedings of WS4 2017 (Lecture Notes in Networks and Systems)$6,780$6,441 -
79折
$232深入淺出詳解RPKI -
$594利用 Python 開源工具分析惡意代碼 -
$474密碼工程:原理與應用 -
VIP 95折
Smart Computing and Informatics: Proceedings of the First International Conference on SCI 2016, Volume 1 (Smart Innovation, Systems and Technologies)$8,970$8,522 -
VIP 95折
Women in Security: Changing the Face of Technology and Innovation (Women in Engineering and Science)$5,260$4,997 -
VIP 95折
Methods for Location Privacy: A Comparative Overview (Foundations and Trends(r) in Privacy and Security)$2,350$2,233 -
VIP 95折
Information Security Handbook$1,800$1,710 -
VIP 95折
Empirical Research for Software Security: Foundations and Experience (Series in Security, Privacy and Trust)$6,190$5,881 -
VIP 95折
Progress in Cryptology – INDOCRYPT 2017: 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290