資訊安全
相關書籍
-
$1,008逆向工程權威指南 (Reverse Engineering for Beginners) -
VIP 95折
Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, ... Part I (Lecture Notes in Computer Science)$2,510$2,385 -
VIP 95折
KISH CYPHER, THE: THE STORY OF KLJN FOR UNCONDITIONAL SECURITY$6,580$6,251 -
VIP 95折
Physical Security Protection Systems: Implementation and Operation$2,520$2,394 -
$594硬件安全攻防大揭秘 -
VIP 95折
Electronic Voting: First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Guide to Pairing-Based Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)$4,980$4,731 -
VIP 95折
Biometrics in Support of Military Operations: Lessons from the Battlefield$7,400$7,030 -
VIP 95折
Homeland Security: An Introduction to Principles and Practice, (Third Edition)(Hardcover)$4,480$4,256 -
VIP 95折
The Data Protection Officer(Hardcover)$2,450$2,328 -
VIP 95折
Mobile Device Management and Strategy$2,690$2,556 -
VIP 95折
Security for Wireless Sensor Networks using Identity-Based Cryptography( Paperback)$2,720$2,584 -
VIP 95折
Information Security Management Handbook, (Sixth Edition), Volume 6(paperback)$2,660$2,527 -
VIP 95折
Noiseless Steganography: The Key to Covert Communications$3,000$2,850 -
VIP 95折
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Future Data and Security Engineering: Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings (Lecture Notes in Computer Science)$2,370$2,252 -
VIP 95折
Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)$4,510$4,285 -
VIP 95折
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (Advances in Intelligent Systems and Computing)$8,520$8,094 -
VIP 95折
A Fresh Look at Mobile Security$1,570$1,492 -
VIP 95折
Building a Practical Information Security Program$2,540$2,413 -
VIP 95折
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems$6,670$6,337 -
VIP 95折
Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 ... in Information and Communication Technology)$2,510$2,385 -
VIP 95折
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications$3,400$3,230 -
VIP 95折
The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War$1,810$1,720 -
VIP 95折
Cyber Warfare: Building the Scientific Foundation (Advances in Information Security)$5,530$5,254 -
VIP 95折
Trusted Computing Platforms: Tpm2.0 in Context$7,180$6,821 -
VIP 95折
Connect Access Card for Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Fifth Edition (Exams 220-901 & 220-902)$3,410$3,240 -
VIP 95折
LearnSmart Standalone Access Card for Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Fifth Edition (Exams 220-901 and 902)$1,350$1,283 -
VIP 95折
Introduction to Cryptography$790$751