資訊安全 / Penetration-test
相關書籍
-
VIP 95折
CompTIA Security+ Certification Kit , 5th Edition (Exam SY0-501)$3,370$3,202 -
80折
$2,288Network Defense and Countermeasures: Principles and Practices (3rd Edition) (Pearson IT Cybersecurity Curriculum (ITCC)) -
Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Lecture Notes in Computer Science)$4,890$4,792 -
On the Physical Security of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)$4,540$4,449 -
Comprehensive Security for Data Centers and Mission Critical Facilities: (Including EMP Protection)$1,360$1,333 -
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)$8,170$8,007 -
Industrial Espionage and Technical Surveillance Counter Measurers$4,250$4,165 -
80折
$1,184Practical Cyber Intelligence -
Inside Radio: An Attack and Defense Guide (Hardcover)$3,390$3,322 -
VIP 95折
Preventing Ransomware: Understand everything about digital extortion and its prevention$1,390$1,321 -
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats$2,870$2,813 -
80折
$1,680CISM Certified Information Security Manager All-in-One Exam Guide -
Adversary Detection For Cognitive Radio Networks (SpringerBriefs in Electrical and Computer Engineering)$2,430$2,381 -
VIP 95折
Machine Learning and Security: Protecting Systems with Data and Algorithms$2,340$2,223 -
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide$980$960 -
90折
$2,484Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (Pearson IT Cybersecurity Curriculum (ITCC)) -
Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Simula SpringerBriefs on Computing)$1,280$1,254 -
VIP 95折
Advanced Infrastructure Penetration Testing$1,820$1,729 -
Foundations and Practice of Security: 10th International Symposium, Fps 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers$2,430$2,381 -
VIP 95折
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities$1,380$1,311 -
The Beast: a.k.a. IT Security$1,110$1,088 -
PCI DSS 3.2 - A Comprehensive Understanding to Effectively Achieve PCI DSS Compliance$3,150$3,087 -
Practical Information Security: A Competency-Based Education Course$3,770$3,695 -
90折
$1,575Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer (Paperback) -
VIP 95折
New Solutions for Cybersecurity$1,200$1,140 -
Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
50折
$699Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics -
60折
$888Practical Mobile Forensics - Third Edition -
Phishing Attacks: Advanced Attack Techniques$1,500$1,470