資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Attribute-Based Encryption and Access Control$8,520$8,094 -
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting$6,840$6,703 -
Innovative Security Solutions for Information Technology and Communications: 12th International Conference, Secitc 2019, Bucharest, Romania, November$2,430$2,381 -
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events$1,490$1,460 -
VIP 95折
Cyber Warfare - Truth, Tactics, and Strategies$1,040$988 -
Cyber Security of Industrial Control Systems in the Future Internet Environment$7,150$7,007 -
Computer Security: Esorics 2019 International Workshops, Cybericps, Secpre, Spose, and Adiot, Luxembourg City, Luxembourg, September 26-2$2,430$2,381 -
Computer Security: Esorics 2019 International Workshops, Iosec, Mstec, and Finsec, Luxembourg City, Luxembourg, September 26-27, 2019, Re$2,430$2,381 -
80折
$1,168CompTIA PenTest+ Certification Passport (Exam PT0-001) -
Trusted Computing and Information Security: 13th Chinese Conference, Ctcis 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers$2,430$2,381 -
Information and Communications Security: 21st International Conference, Icics 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers$2,440$2,391 -
Transactions on Computational Science XXXV: Special Issue on Signal Processing and Security in Distributed Systems$2,620$2,568 -
VIP 95折
Build Your Own Cybersecurity Testing Lab: Low-Cost Solutions for Testing in Virtual and Cloud-Based Environments$1,750$1,663 -
Risks and Security of Internet and Systems: 14th International Conference, Crisis 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings$2,430$2,381 -
Information Security and Cryptology - Icisc 2019: 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers$2,430$2,381 -
Adaptive Autonomous Secure Cyber Systems$7,230$7,085 -
VIP 95折
Digital Forensics and Incident Response - Second Edition$2,150$2,043 -
95折
$1,492Applied Incident Response -
VIP 95折
Intrusion Detection: A Data Mining Approach$7,090$6,736 -
Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,$2,430$2,381 -
Information Security Applications: 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers$2,430$2,381 -
Red Team Development and Operations: A practical guide$810$794 -
Latest Check Point Certified Security Administrator 156-215.80 R80 Questions and Answers: 156-215.80 Workbook$980$960 -
Advances in Cyber Security: First International Conference, Aces 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers$2,430$2,381 -
Cryptography and Network Security: Principles and Practice, 8/e (RENTAL EDITION)$2,780$2,724 -
90折
$918Cyber Minds -
Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II$2,430$2,381 -
VIP 95折
Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I$2,580$2,451 -
Cybersecurity - Attack and Defense Strategies - Second Edition$3,250$3,185 -
Cyberspace Mimic Defense: Generalized Robust Control and Endogenous Security$8,800$8,624