資訊安全
相關書籍
-
$474密碼工程:原理與應用 -
VIP 95折
Smart Computing and Informatics: Proceedings of the First International Conference on SCI 2016, Volume 1 (Smart Innovation, Systems and Technologies)$9,130$8,673 -
Women in Security: Changing the Face of Technology and Innovation (Women in Engineering and Science)$5,360$5,252 -
Methods for Location Privacy: A Comparative Overview (Foundations and Trends(r) in Privacy and Security)$2,390$2,342 -
VIP 95折
Information Security Handbook$1,840$1,748 -
VIP 95折
Empirical Research for Software Security: Foundations and Experience (Series in Security, Privacy and Trust)$5,970$5,671 -
Progress in Cryptology – INDOCRYPT 2017: 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings (Lecture Notes in Computer Science)$2,460$2,410 -
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science)$2,460$2,410 -
Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings (Lecture Notes in Computer Science)$2,460$2,410 -
Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,460$2,410 -
Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,460$2,410 -
VIP 95折
Serious Cryptography: A Practical Introduction to Modern Encryption (Paperback)$1,830$1,738 -
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong ... Part III (Lecture Notes in Computer Science)$2,460$2,410 -
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts (Terrorism, Security, and Computation)$8,070$7,908 -
VIP 95折
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$7,350$6,982 -
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Lecture Notes in Computer Science)$2,460$2,410 -
VIP 95折
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$3,130$2,973 -
Codes, Cryptology and Curves with Computer Algebra$7,930$7,771 -
VIP 95折
Codes, Cryptology and Curves with Computer Algebra$2,145$2,037 -
PoC or GTFO (Hardcover)$1,530$1,499 -
VIP 95折
Private Security: An Introduction to Principles and Practice$4,620$4,389 -
95折
$1,833Agile Application Security: Enabling Security in a Continuous Delivery Pipeline -
Principles and Implementation Techniques of Software-Based Fault Isolation (Foundations and Trends(r) in Privacy and Security)$2,390$2,342 -
Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,460$2,410 -
$294雲安全基礎設施構建:從解決方案的視角看雲安全 -
VIP 95折
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Internal Audit and IT Audit)$1,960$1,862 -
Fundamental of Cyber Security$1,280$1,254 -
Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Law, Governance and Technology Series)$8,070$7,908 -
VIP 95折
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks (Intelligent Data-Centric Systems: Sensor Collected Intelligence)$4,620$4,389 -
50折
$990Intelligence-Driven Incident Response: Outwitting the Adversary