資訊安全 / Penetration-test
相關書籍
-
Security Analytics for the Internet of Everything$2,740$2,685 -
Cybersecurity and Privacy in Cyber Physical Systems$2,740$2,685 -
VIP 95折
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework$2,410$2,290 -
VIP 95折
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman$3,990$3,791 -
Advancing Computational Intelligence Techniques for Security Systems Design$6,080$5,958 -
Security and Cryptography for Networks: 13th International Conference, SCN 2022, Amalfi (SA), Italy, September 12-14, 2022, Proceedings$5,030$4,929 -
VIP 95折
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing$1,370$1,302 -
Strategic Cyber Security Management$8,760$8,585 -
Unleashing the Art of Digital Forensics$6,840$6,703 -
Security Risk Models for Cyber Insurance$2,780$2,724 -
VIP 95折
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence$1,850$1,758 -
Artificial Intelligence for Cybersecurity$7,380$7,232 -
90折
$1,845Hacking APIs: Breaking Web Application Programming Interfaces (Paperback) -
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices$1,560$1,529 -
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil?$2,430$2,381 -
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil?$3,660$3,587 -
VIP 95折
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation$1,600$1,520 -
Security Analytics: A Data Centric Approach to Information Security$7,990$7,830 -
VIP 95折
Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunti$1,760$1,672 -
Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (Eng$1,560$1,529 -
Evidence-Based Cybersecurity: Foundations, Research, and Practice$3,580$3,508 -
Intelligent Computing and Communication Systems$8,950$8,771 -
Cyber Crime Investigator's Field Guide$3,310$3,244 -
95折
$1,653Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT (Paperback) -
VIP 95折
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs$1,600$1,520 -
VIP 95折
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs$1,750$1,663 -
80折
$1,064Practical Social Engineering: A Primer for the Ethical Hacker -
Cybercrime and Digital Forensics: An Introduction$7,710$7,556 -
VIP 95折
Cybercrime and Digital Forensics: An Introduction (Paperback)$1,860$1,767 -
Security without Obscurity: Frequently Asked Questions (FAQ)$2,320$2,274