資訊安全
相關書籍
-
$714漏洞戰爭:軟件漏洞分析精要 -
$348軟件安全開發:屬性驅動模式 -
$294網絡信息安全工程技術與應用分析 -
VIP 95折
The Official (ISC)2 Guide to the CCSP CBK 2/e (Hardcover)$2,640$2,508 -
VIP 95折
Identity in a Digital World: What It Is and How to Protect It$2,740$2,603 -
資訊安全管理, 4/e (Whitman: Management of Information Security, 4/e)
$580$568 -
VIP 95折
Information Security: Policy, Processes, and Practices (Advances in Management Informations Systems)$3,090$2,936 -
VIP 95折
Digital Rights Management: Protecting and Monetizing Content(Hardcover)$7,540$7,163 -
VIP 95折
Bash Pocket Reference, 2/e (Paperback)$1,020$969 -
VIP 95折
DYNAMIC NETWORKS AND CYBER-SECURITY$4,350$4,133 -
VIP 95折
Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Advances in Cryptology -- ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, ... Part I (Lecture Notes in Computer Science)$4,690$4,456 -
VIP 95折
Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of ... (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Tor and the Dark Net: Remain Anonymous and Evade Nsa Spying$680$646 -
VIP 95折
E-mail and Behavioral Changes: Uses and Misuses of Electronic Communications (Hardcover)$6,330$6,014 -
VIP 95折
Adopting Biometric Technology: Challenges and Solutions$6,980$6,631 -
85折
揭秘家用路由器 0day 漏洞挖掘技術$490$417 -
VIP 95折
Security of Block Ciphers: From Algorithm Design to Hardware Implementation(Hardcover)$4,510$4,285 -
VIP 95折
Introduction to Secure Outsourcing Computation (Synthesis Lectures on Information Security, Privacy, & Trust)$1,530$1,454 -
VIP 95折
Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, ... Part II (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Post-Quantum Cryptography(Paperback)$2,410$2,290 -
VIP 95折
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)$4,560$4,332 -
VIP 95折
Data Privacy Management, and Security Assurance(Paperback)$4,500$4,275 -
VIP 95折
Computer Access Control: Federated Identity$2,260$2,147 -
VIP 95折
Fundamentals of Information Classification: A Practitioner's Reference(Hardcover)$2,740$2,603 -
VIP 95折
Physical Security and Wireless Access Control Systems Hardcover$3,080$2,926 -
VIP 95折
Trusted Systems(Paperback)$2,410$2,290 -
79折
網站入侵現場鑑證實錄$380$300 -
VIP 95折
Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA (Routledge Studies in the Growth Economies of Asia)$8,680$8,246