資訊安全
相關書籍
-
VIP 95折
Flexible Network Architectures Security: Principles and Issues$3,300$3,135 -
The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies$4,680$4,586 -
Information Security JumpStart Guide$680$666 -
VIP 95折
CPTED and Traditional Security Countermeasures: 150 Things You Should Know$3,660$3,477 -
VIP 95折
Cpted and Traditional Security Countermeasures: 150 Things You Should Know$8,580$8,151 -
VIP 95折
Windows Security Monitoring: Scenarios and Patterns$1,750$1,662 -
Advances in Data and Information Sciences: Proceedings of ICDIS-2017, Volume 1 (Lecture Notes in Networks and Systems)$8,070$7,908 -
Privacy’s Blueprint: The Battle to Control the Design of New Technologies$1,620$1,587 -
Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings (Lecture Notes in Computer Science)$3,580$3,508 -
VIP 95折
Technology and the Intelligence Community: Challenges and Advances for the 21st Century (Advanced Sciences and Technologies for Security Applications)$6,760$6,422 -
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (Lecture Notes in Computer Science)$2,460$2,410 -
Security with Intelligent Computing and Big-data Services (Advances in Intelligent Systems and Computing)$2,460$2,410 -
VIP 95折
Access to Online Resources: A Guide for the Modern Librarian$2,800$2,660 -
Cyber Security for Cyber Physical Systems (Studies in Computational Intelligence)$8,070$7,908 -
Transactions on Computational Science XXXII: Special Issue on Cybersecurity and Biometrics (Lecture Notes in Computer Science)$2,460$2,410 -
Dynamic Games for Network Security (SpringerBriefs in Electrical and Computer Engineering)$2,460$2,410 -
VIP 95折
CCSP Certified Cloud Security Professional Practice Exams$1,560$1,482 -
85折
$346碼書 : 編碼與解碼的戰爭 -
Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, ... Part II (Lecture Notes in Computer Science)$2,460$2,410 -
FireEye Deployment Made Easy$890$872 -
Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,650$2,597 -
The GnuTLS 3.6.1 Manual$1,020$999 -
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys$1,250$1,225 -
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 6/e (Paperback)$1,810$1,773 -
78折
秋聲教你學資訊安全與駭客技術:反組譯工具的使用導向$620$484 -
Mobile Internet Security: First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers (Communications in Computer and Information Science)$2,460$2,410 -
Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,460$2,410 -
Smart Trends in Systems, Security and Sustainability: Proceedings of WS4 2017 (Lecture Notes in Networks and Systems)$6,910$6,771 -
75折
$220深入淺出詳解RPKI -
$594利用 Python 開源工具分析惡意代碼