資訊安全
相關書籍
-
VIP 95折
Dynamic Games for Network Security (SpringerBriefs in Electrical and Computer Engineering)$2,370$2,252 -
VIP 95折
CCSP Certified Cloud Security Professional Practice Exams$1,500$1,425 -
VIP 95折
碼書 : 編碼與解碼的戰爭$408$388 -
VIP 95折
Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, ... Part II (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
FireEye Deployment Made Easy$860$817 -
VIP 95折
Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,550$2,423 -
VIP 95折
The GnuTLS 3.6.1 Manual$980$931 -
VIP 95折
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys$1,200$1,140 -
VIP 95折
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 6/e (Paperback)$1,740$1,653 -
78折
秋聲教你學資訊安全與駭客技術:反組譯工具的使用導向$620$484 -
VIP 95折
Mobile Internet Security: First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers (Communications in Computer and Information Science)$2,370$2,252 -
VIP 95折
Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Smart Trends in Systems, Security and Sustainability: Proceedings of WS4 2017 (Lecture Notes in Networks and Systems)$6,650$6,318 -
75折
$221深入淺出詳解RPKI -
$594利用 Python 開源工具分析惡意代碼 -
$474密碼工程:原理與應用 -
VIP 95折
Smart Computing and Informatics: Proceedings of the First International Conference on SCI 2016, Volume 1 (Smart Innovation, Systems and Technologies)$8,800$8,360 -
VIP 95折
Women in Security: Changing the Face of Technology and Innovation (Women in Engineering and Science)$5,160$4,902 -
VIP 95折
Methods for Location Privacy: A Comparative Overview (Foundations and Trends(r) in Privacy and Security)$2,300$2,185 -
VIP 95折
Information Security Handbook$1,770$1,682 -
VIP 95折
Empirical Research for Software Security: Foundations and Experience (Series in Security, Privacy and Trust)$6,080$5,776 -
VIP 95折
Progress in Cryptology – INDOCRYPT 2017: 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science)$2,370$2,252 -
VIP 95折
Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Serious Cryptography: A Practical Introduction to Modern Encryption (Paperback)$1,760$1,672 -
VIP 95折
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong ... Part III (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts (Terrorism, Security, and Computation)$7,770$7,382 -
VIP 95折
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$7,770$7,382