資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Conducting Network Penetration and Espionage in a Global Environment$2,910$2,765 -
VIP 95折
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws$1,380$1,311 -
VIP 95折
Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach (Computer Communications and Networks)$2,600$2,470 -
VIP 95折
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International in Computer and Information Science$2,410$2,290 -
VIP 95折
Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings (Lecture Notes in Computer Science)$4,120$3,914 -
VIP 95折
Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Smart Micro-Grid Systems Security and Privacy (Advances in Information Security)$4,500$4,275 -
VIP 95折
Computer Information Systems and Industrial Management: 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 2 (Advances in Intelligent Systems and Computing)$12,890$12,246 -
VIP 95折
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3 (Advances in Intelligent Systems and Computing)$8,710$8,275 -
80折
$1,088Network Vulnerability Assessment: Identify security loopholes in your network s infrastructure -
95折
$2,109Effective Cybersecurity: A Guide to Using Best Practices and Standards (Paperback) -
VIP 95折
Bits to Bitcoin: How Our Digital Stuff Works (The MIT Press)$1,360$1,292 -
VIP 95折
Information Risk and Security$2,630$2,499 -
VIP 95折
Investigating Windows Systems$2,450$2,328 -
VIP 95折
Advances in Digital Forensics XIII: 13th Ifip Wg 11.9 International Conference, Orlando, Fl, Usa, January 30 - February 1, 2017, Revised Selected Pape$5,330$5,064 -
VIP 95折
Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications$2,360$2,242 -
80折
$2,208Developing Cybersecurity Programs and Policies 3rd -
VIP 95折
Practical Data Security (Routledge Revivals)$4,810$4,570 -
VIP 95折
Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering)$2,410$2,290 -
80折
$1,216Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing -
80折
$1,184Hands-On Cybersecurity for Architects: Plan and design robust security architectures -
VIP 95折
Hands-On Penetration Testing on Windows: Unleashing Kali Linux, PowerShell and Windows debugging tools for security testing and analysis$1,800$1,710 -
VIP 95折
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments$1,500$1,425 -
VIP 95折
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time$2,630$2,499 -
VIP 95折
Ict Systems Security and Privacy Protection: 32nd Ifip Tc 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings$4,690$4,456 -
Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)$3,450$3,381 -
VIP 95折
Game Theory for Security and Risk Management: From Theory to Practice$5,640$5,358 -
VIP 95折
National Cybersecurity Framework: A Solution for “Agile Cybersecurity”: Blueprint for Rapid Cybersecurity Implementation$970$922 -
VIP 95折
Advanced Penetration Testing: Hacking AWS$1,580$1,501