資訊安全 / Penetration-test
相關書籍
-
80折
$1,760CISM Certified Information Security Manager All-In-One Exam Guide, Second Edition, 2/e (Paperback) -
VIP 95折
Cissp Passport (Paperback)$1,400$1,330 -
VIP 95折
Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating$1,600$1,520 -
VIP 95折
Network Security: Private Communication in a Public World (Hardcover)$2,600$2,470 -
Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English$2,110$2,067 -
VIP 95折
Cyberpredators and Their Prey$2,590$2,460 -
Big Data Privacy and Security in Smart Cities$4,540$4,449 -
Big Data Analytics and Computational Intelligence for Cybersecurity$6,840$6,703 -
VIP 95折
Zero Trust Journey Across the Digital Estate$2,160$2,052 -
VIP 95折
Cyber Security Threats and Challenges Facing Human Life$4,690$4,455 -
95折
$1,121Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures -
VIP 95折
Check Point Firewall Administration R81.10+: A practical guide to Check Point firewall deployment and administration$2,090$1,985 -
VIP 95折
Security and Privacy in Cyberspace$4,740$4,503 -
VIP 95折
Security Analytics for the Internet of Everything$2,460$2,337 -
VIP 95折
Cybersecurity and Privacy in Cyber Physical Systems$2,460$2,337 -
VIP 95折
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework$2,250$2,137 -
VIP 95折
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman$3,990$3,790 -
VIP 95折
Advancing Computational Intelligence Techniques for Security Systems Design$5,450$5,177 -
Security and Cryptography for Networks: 13th International Conference, SCN 2022, Amalfi (SA), Italy, September 12-14, 2022, Proceedings$5,030$4,929 -
VIP 95折
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing$1,370$1,301 -
VIP 95折
Strategic Cyber Security Management$7,590$7,210 -
VIP 95折
Unleashing the Art of Digital Forensics$5,910$5,614 -
VIP 95折
Security Risk Models for Cyber Insurance$2,500$2,375 -
VIP 95折
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence$1,850$1,757 -
Artificial Intelligence for Cybersecurity$7,380$7,232 -
90折
$1,845Hacking APIs: Breaking Web Application Programming Interfaces (Paperback) -
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices$1,560$1,528 -
VIP 95折
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil?$2,190$2,080 -
VIP 95折
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil?$3,230$3,068 -
VIP 95折
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation$1,600$1,520