資訊安全 / 駭客 Hack
相關書籍
- 
  
      
    VIP 95折
  Topics in Cryptology -- CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Lecture Notes in Computer Science)$2,370$2,252 - 
  
      
    VIP 95折
  Mobile Health: A Technology Road Map (Springer Series in Bio-/Neuroinformatics)$9,820$9,329 - 
  
      
    VIP 95折
  SCFM: Secure Coding Field Manual: A Programmer's Guide to OWASP Top 10 and CWE/SANS Top 25$650$618 - 
  
      
    80折
  $1,584Hacking Exposed Wireless, 3/e : Wireless Security Secrets & Solutions (Paperback) - 
  
      
    VIP 95折
  Hacking Wireless Networks - The ultimate hands-on guide (快遞進口)$1,160$1,102 - 
  
      
    VIP 95折
  Web Security: A WhiteHat Perspective (Paperback)$2,800$2,660 - 
  
      
    VIP 95折
  The Mobile Application Hacker's Handbook (Paperback)$1,980$1,881 - 
  
      
    VIP 95折
  Embedded Device Security: Pwn the device$1,840$1,748 - 
  
      
    VIP 95折
  Spam: A Shadow History of the Internet (Infrastructures)$1,500$1,425 - 
  
      
    VIP 95折
  Hacking Back: Offensive Cyber Counterintelligence$2,090$1,986 - 
  
      
    VIP 95折
  How to Define and Build an Effective Cyber Threat Intelligence Capability Paperback$1,580$1,501 - 
  
      
    80折
  $1,540Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization (Paperback) - 
  
      
    60折
  $798Black Hat Python: Python Programming for Hackers and Pentesters (Paperback) - 
  
      
    VIP 95折
  The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives$4,890$4,646 - 
  
      
    VIP 95折
  Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements (Paperback)$1,090$1,036 - 
  
      
    VIP 95折
  10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy (Paperback)$1,400$1,330 - 
  
      
    VIP 95折
  Detecting and Combating Malicious Email$1,270$1,207 - 
  
      
    43折
  $999CEH Certified Ethical Hacker Bundle, 2/e (Paperback) - 
  
      
    VIP 95折
  Hacking Europe: From Computer Cultures to Demoscenes (History of Computing)$5,160$4,902 - 
  
      
    VIP 95折
  Transparent User Authentication: Biometrics, RFID and Behavioural Profiling$4,510$4,285 - 
  
      
    50折
  $875CEH: Certified Ethical Hacker Version 8 Study Guide (Paperback) - 
  
      
    60折
  $1,050Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Hardcover) - 
  
      
    VIP 95折
  Cybersecurity for Executives: A Practical Guide (Hardcover)$3,760$3,572 - 
  
      
    VIP 95折
  CyberCrime - A Clear and Present Danger The Ceo's Guide to Cyber Security$2,400$2,280 - 
  
      
    VIP 95折
  CyberCrime - A Clear and Present Danger: The CEO's Guide to Cyber Security$1,870$1,777 - 
  
      
    VIP 95折
  When is a Hack an Attack? A Sovereign State's Options if Attacked in Cyberspace: A Case Study of Estonia (Computer Hacking and Security )$790$751 - 
  
      
    80折
  $698Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals (Paperback) - 
  
      
    VIP 95折
  Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns$2,370$2,252 - 
  
      
    VIP 95折
  QC-LDPC Code-Based Cryptography (SpringerBriefs in Electrical and Computer Engineering)$2,370$2,252 - 
  
      
    VIP 95折
  The Economics of Financial and Medical Identity Theft$2,370$2,252