資訊安全
相關書籍
-
$534安全測試指南, 4/e -
Watermarking Security: Fundamentals, Secure Designs and Attacks (SpringerBriefs in Electrical and Computer Engineering)$2,460$2,410 -
SNIA Certified Storage Professional Certification Exam Review Questions and Answers 2016/17 Edition: 80+ Unofficial Review Questions covering the Storage Networking Foundations Exam (S10-110)$950$931 -
VIP 95折
Cybersecurity and Applied Mathematics$2,630$2,498 -
$534圖解密碼技術, 3/e -
$714漏洞戰爭:軟件漏洞分析精要 -
$348軟件安全開發:屬性驅動模式 -
$294網絡信息安全工程技術與應用分析 -
VIP 95折
The Official (ISC)2 Guide to the CCSP CBK 2/e (Hardcover)$2,640$2,508 -
VIP 95折
Identity in a Digital World: What It Is and How to Protect It$2,480$2,356 -
資訊安全管理, 4/e (Whitman: Management of Information Security, 4/e)
$580$568 -
VIP 95折
Information Security: Policy, Processes, and Practices (Advances in Management Informations Systems)$2,830$2,688 -
VIP 95折
Digital Rights Management: Protecting and Monetizing Content(Hardcover)$6,580$6,251 -
95折
$969Bash Pocket Reference, 2/e (Paperback) -
DYNAMIC NETWORKS AND CYBER-SECURITY$4,430$4,341 -
Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings (Lecture Notes in Computer Science)$2,460$2,410 -
Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,460$2,410 -
VIP 95折
Advances in Cryptology -- ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, ... Part I (Lecture Notes in Computer Science)$4,780$4,541 -
Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of ... (Lecture Notes in Computer Science)$2,460$2,410 -
Tor and the Dark Net: Remain Anonymous and Evade Nsa Spying$690$676 -
E-mail and Behavioral Changes: Uses and Misuses of Electronic Communications (Hardcover)$6,450$6,321 -
VIP 95折
Adopting Biometric Technology: Challenges and Solutions$6,580$6,251 -
85折
揭秘家用路由器 0day 漏洞挖掘技術$490$416 -
Security of Block Ciphers: From Algorithm Design to Hardware Implementation(Hardcover)$4,590$4,498 -
VIP 95折
Introduction to Secure Outsourcing Computation (Synthesis Lectures on Information Security, Privacy, & Trust)$1,560$1,482 -
Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, ... Part II (Lecture Notes in Computer Science)$2,460$2,410 -
Post-Quantum Cryptography(Paperback)$2,460$2,410 -
VIP 95折
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)$4,300$4,085 -
Data Privacy Management, and Security Assurance(Paperback)$4,580$4,488 -
Computer Access Control: Federated Identity$2,310$2,263