資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings (Communications in Computer and Information Science)$2,410$2,290 -
VIP 95折
Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide)$2,330$2,214 -
VIP 95折
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Cyberspace and Cybersecurity, Second Edition$3,300$3,135 -
VIP 95折
Network Security through Data Analysis: From Data to Action, 2/e$1,930$1,834 -
VIP 95折
Anomaly Detection as a Service: Challenges, Advances, and Opportunities$2,440$2,318 -
VIP 95折
Anomaly Detection As a Service: Challenges, Advances, and Opportunities (Synthesis Lectures on Information Security, Privacy, and Trust)$3,040$2,888 -
VIP 95折
SCION: A Secure Internet Architecture (Information Security and Cryptography)$2,410$2,290 -
VIP 95折
Certified Ethical Hacker (CEH) Version 9 uCertify Labs Access Card (2nd Edition) (Certification Guide)$4,850$4,608 -
VIP 95折
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Cybercrime and Digital Forensics: An Introduction$3,180$3,021 -
VIP 95折
Web Application Firewalls: A Practical Approach$2,260$2,147 -
VIP 95折
Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Intrusion Detection Networks: A Key to Collaborative Security$2,390$2,271 -
VIP 95折
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level$6,930$6,584 -
VIP 95折
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Guide to Digital Forensics: A Concise and Practical Introduction (SpringerBriefs in Computer Science)$2,600$2,470 -
VIP 95折
Predictive Computing and Information Security$4,880$4,636 -
VIP 95折
What Every Engineer Should Know About Cyber Security and Digital Forensics$7,570$7,192 -
VIP 95折
Computer Safety, Reliability, and Security: SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Security Operations Center - Analyst Guide: SIEM Technology, Use Cases and Practices$2,360$2,242 -
VIP 95折
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools (Computer Communications and Networks)$3,910$3,715 -
50折
$990Intelligence-Driven Incident Response: Outwitting the Adversary -
VIP 95折
Security and Trust Management: 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Advances in User Authentication (Infosys Science Foundation Series)$3,910$3,715 -
VIP 95折
Policies & Procedures for Data Security: A Complete Manual for Computer Systems and Networks$8,610$8,180 -
VIP 95折
Intrusion Detection and Prevention for Mobile Ecosystems (Series in Security, Privacy and Trust)$6,190$5,881 -
VIP 95折
Hash Crack: Password Cracking Manual (v2.0)$940$893 -
VIP 95折
Computer and Network Security Essentials$7,920$7,524