資訊安全 / Penetration-test
相關書籍
-
Introductory Computer Forensics: A Hands-On Practical Approach$4,930$4,831 -
Hacker Methodology Handbook$810$794 -
VIP 95折
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet$2,610$2,480 -
VIP 95折
You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy)$1,370$1,302 -
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 3/e (Paperback)$2,550$2,499 -
Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Becoming the Hacker: The Playbook for Getting Inside the Mind of the Attacker$1,670$1,587 -
VIP 95折
The CIO’s Guide to Information Security Incident Management$3,180$3,021 -
80折
$1,960CISSP All-in-One Exam Guide, 8/e (Paperback) -
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India (Advances in Intelligent Systems and Computing)$6,840$6,703 -
90折
$1,620Network Scanning Cookbook: Practical network security using Nmap and Nessus 7 -
VIP 95折
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues$3,070$2,917 -
VIP 95折
Hands-On Red Team Tactics: Gather exploitation intelligence, identify risk, and expose vulnerabilities$1,670$1,587 -
VIP 95折
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite$1,820$1,729 -
90折
$1,782Malware Data Science: Attack Detection and Attribution -
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents$2,260$2,215 -
VIP 95折
Network Attacks and Defenses$3,010$2,860 -
VIP 95折
Managing Trust in Cyberspace$3,140$2,983 -
VIP 95折
Security and Privacy in Smart Grids$3,040$2,888 -
VIP 95折
Conducting Network Penetration and Espionage in a Global Environment$2,940$2,793 -
VIP 95折
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws$1,380$1,311 -
Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach (Computer Communications and Networks)$2,620$2,568 -
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International in Computer and Information Science$2,430$2,381 -
Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings (Lecture Notes in Computer Science)$4,160$4,077 -
Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Smart Micro-Grid Systems Security and Privacy (Advances in Information Security)$4,540$4,449 -
Computer Information Systems and Industrial Management: 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 2 (Advances in Intelligent Systems and Computing)$13,010$12,750 -
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3 (Advances in Intelligent Systems and Computing)$8,800$8,624 -
80折
$1,088Network Vulnerability Assessment: Identify security loopholes in your network s infrastructure