資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Cyber Security: Power and Technology (Intelligent Systems, Control and Automation: Science and Engineering)$6,930$6,584 -
VIP 95折
Honeypot Frameworks and Their Applications: A New Framework (SpringerBriefs on Cyber Security Systems and Networks)$2,850$2,708 -
VIP 95折
NIST 800-171 "Combat Guide": for the Cybersecurity Professional$810$770 -
VIP 95折
CompTIA Security+ Certification Kit: Exam SY0-501$3,740$3,553 -
VIP 95折
Cyber Threat Intelligence (Advances in Information Security)$7,160$6,802 -
VIP 95折
Holistic Information Security$1,530$1,454 -
The Hacker Playbook 3: Practical Guide To Penetration Testing (Paperback)$1,340$1,313 -
VIP 95折
Cyber Security: Proceedings of CSI 2015 (Advances in Intelligent Systems and Computing)$4,590$4,361 -
VIP 95折
Python For Offensive PenTest: A complete practical guide to ethical hacking and penetration testing using Python$1,320$1,254 -
VIP 95折
Security and Privacy in Communication Networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25. and Telecommunications Engineering$2,410$2,290 -
VIP 95折
Moving Target Defense for Distributed Systems (Wireless Networks)$2,550$2,423 -
VIP 95折
CompTIA Security+ Certification Kit , 5th Edition (Exam SY0-501)$3,340$3,173 -
80折
$2,288Network Defense and Countermeasures: Principles and Practices (3rd Edition) (Pearson IT Cybersecurity Curriculum (ITCC)) -
VIP 95折
Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Lecture Notes in Computer Science)$4,840$4,598 -
VIP 95折
On the Physical Security of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)$4,500$4,275 -
VIP 95折
Comprehensive Security for Data Centers and Mission Critical Facilities: (Including EMP Protection)$1,350$1,283 -
VIP 95折
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)$8,090$7,686 -
VIP 95折
Industrial Espionage and Technical Surveillance Counter Measurers$4,210$4,000 -
80折
$1,184Practical Cyber Intelligence -
VIP 95折
Inside Radio: An Attack and Defense Guide (Hardcover)$3,360$3,192 -
VIP 95折
Preventing Ransomware: Understand everything about digital extortion and its prevention$1,380$1,311 -
VIP 95折
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats$3,010$2,860 -
80折
$1,680CISM Certified Information Security Manager All-in-One Exam Guide -
VIP 95折
Adversary Detection For Cognitive Radio Networks (SpringerBriefs in Electrical and Computer Engineering)$2,410$2,290 -
VIP 95折
Machine Learning and Security: Protecting Systems with Data and Algorithms$2,340$2,223 -
VIP 95折
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide$970$922 -
90折
$2,484Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (Pearson IT Cybersecurity Curriculum (ITCC)) -
VIP 95折
Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Simula SpringerBriefs on Computing)$1,270$1,207 -
VIP 95折
Advanced Infrastructure Penetration Testing$1,800$1,710