資訊安全
相關書籍
-
VIP 95折
Multimedia Security: Watermarking, Steganography, and Forensics$4,690$4,456 -
VIP 95折
SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110)$2,100$1,995 -
95折
$1,710OAuth 2 in Action (Paperback) -
VIP 95折
Cybersecurity for Beginners (Paperback)$1,010$960 -
VIP 95折
The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development (Internal Audit and IT Audit)$5,940$5,643 -
VIP 95折
Cybersecurity: Geopolitics, Law, and Policy$9,820$9,329 -
VIP 95折
Lightweight Cryptography for Security and Privacy: 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Cybersecurity: Geopolitics, Law, and Policy$2,710$2,575 -
VIP 95折
Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
$1,008逆向工程權威指南 (Reverse Engineering for Beginners) -
VIP 95折
Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, ... Part I (Lecture Notes in Computer Science)$2,550$2,423 -
VIP 95折
KISH CYPHER, THE: THE STORY OF KLJN FOR UNCONDITIONAL SECURITY$6,700$6,365 -
VIP 95折
Physical Security Protection Systems: Implementation and Operation$2,560$2,432 -
$594硬件安全攻防大揭秘 -
VIP 95折
Electronic Voting: First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Guide to Pairing-Based Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)$5,070$4,817 -
VIP 95折
Biometrics in Support of Military Operations: Lessons from the Battlefield$7,540$7,163 -
VIP 95折
Homeland Security: An Introduction to Principles and Practice, (Third Edition)(Hardcover)$4,570$4,342 -
VIP 95折
The Data Protection Officer(Hardcover)$2,450$2,328 -
VIP 95折
Mobile Device Management and Strategy$2,740$2,603 -
VIP 95折
Security for Wireless Sensor Networks using Identity-Based Cryptography( Paperback)$2,770$2,632 -
VIP 95折
Information Security Management Handbook, (Sixth Edition), Volume 6(paperback)$2,710$2,575 -
VIP 95折
Noiseless Steganography: The Key to Covert Communications$3,060$2,907 -
VIP 95折
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Future Data and Security Engineering: Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)$4,590$4,361 -
VIP 95折
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (Advances in Intelligent Systems and Computing)$8,680$8,246 -
VIP 95折
A Fresh Look at Mobile Security$1,600$1,520