資訊安全
相關書籍
-
Introduction to Public Key Technology and the Federal PKI Infrastructure$720$705 -
VIP 95折
Authority Based Access Control: Securing Life Online and Open Social Networking$2,790$2,650 -
VIP 95折
Corporate Computer Security$7,580$7,201 -
Cybersecurity and Cyberwar: What Everyone Needs to Know(r)$840$823 -
Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities$4,970$4,870 -
NTRU Cryptography: A Lattice-Based Cryptosystem and Attacks against it$1,580$1,548 -
VIP 95折
Securing Web Applications$2,790$2,650 -
Building an Information Technology Security Awareness and Training Program$790$774 -
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)$790$774 -
A Framework for Designing Cryptographic Key Management Systems$820$803 -
VIP 95折
Identity and Access Management: Business Performance Through Connected Intelligence$2,300$2,185 -
VIP 95折
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud (Auerbach Book)$3,130$2,973 -
VIP 95折
Core Software Security: Security at the Source (Hardcover)$5,970$5,671 -
Introduction to Public Key Infrastructures$3,810$3,733 -
VIP 95折
Mobile Platform Security (Synthesis Lectures on Information Security, Privacy, and Trust)$1,560$1,482 -
VIP 95折
Introduction to Information Security: A Strategic-Based Approach$2,800$2,660 -
75折
$175數據恢復技術案例教程 -
ISO27001/ISO27002 a Pocket Guide - Second Edition: 2013$950$931 -
Complete Internet Privacy: The Quickest Guide to Being Anonymous Online$1,020$999 -
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models$890$872 -
Mobile Security: A Guide for Users$620$607 -
VIP 95折
Official (ISC)2 Guide to the CSSLP CBK, 2/e (Hardcover)$4,010$3,809 -
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)$2,460$2,410 -
VIP 95折
Enterprise Architecture and Information Assurance: Developing a Secure Foundation (Hardcover)$2,430$2,308 -
VIP 95折
Open Source Identity Management Patterns and Practices Using OpenAM 10.x$1,400$1,330 -
VIP 95折
Securing System Information Flows$2,480$2,356 -
VIP 95折
Information Security Management Principles, 2/e (Paperback)$1,750$1,662 -
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend$990$970 -
79折
Binary Hacks -- 駭客秘傳技巧一百招$580$458 -
Simple Steps to Data Encryption: A Practical Guide to Secure Computing (Paperback)$1,050$1,029