資訊安全
相關書籍
-
VIP 95折
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science)$2,410$2,290 -
VIP 95折
Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Serious Cryptography: A Practical Introduction to Modern Encryption (Paperback)$1,800$1,710 -
VIP 95折
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong ... Part III (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts (Terrorism, Security, and Computation)$7,920$7,524 -
VIP 95折
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$7,920$7,524 -
VIP 95折
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$3,280$3,116 -
VIP 95折
Codes, Cryptology and Curves with Computer Algebra$7,780$7,391 -
VIP 95折
Codes, Cryptology and Curves with Computer Algebra$2,145$2,038 -
VIP 95折
PoC or GTFO (Hardcover)$1,500$1,425 -
VIP 95折
Private Security: An Introduction to Principles and Practice$5,100$4,845 -
VIP 90折
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline$1,834$1,737 -
VIP 95折
Principles and Implementation Techniques of Software-Based Fault Isolation (Foundations and Trends(r) in Privacy and Security)$2,350$2,233 -
VIP 95折
Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
$294雲安全基礎設施構建:從解決方案的視角看雲安全 -
VIP 95折
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Internal Audit and IT Audit)$2,140$2,033 -
VIP 95折
Fundamental of Cyber Security$1,250$1,188 -
VIP 95折
Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Law, Governance and Technology Series)$7,920$7,524 -
VIP 95折
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks (Intelligent Data-Centric Systems: Sensor Collected Intelligence)$4,530$4,304 -
50折
$990Intelligence-Driven Incident Response: Outwitting the Adversary -
VIP 95折
IT Convergence and Security 2017: Volume 2 (Lecture Notes in Electrical Engineering)$6,780$6,441 -
$299信息安全管理, 2/e -
VIP 95折
IT Convergence and Security 2017: Volume 1 (Lecture Notes in Electrical Engineering)$8,680$8,246 -
VIP 95折
Cyber-Physical Security and Privacy in the Electric Smart Grid$1,230$1,169 -
VIP 95折
The EU General Data Protection Regulation (GDPR): A Practical Guide$6,630$6,299 -
VIP 95折
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide and CCSP CBK Kit$4,710$4,475 -
85折
$250諸神之眼 : Nmap 網絡安全審計技術揭秘