資訊安全 / Penetration-test
相關書籍
-
80折
$1,680CISM Certified Information Security Manager All-in-One Exam Guide -
Adversary Detection For Cognitive Radio Networks (SpringerBriefs in Electrical and Computer Engineering)$2,430$2,381 -
VIP 90折
Machine Learning and Security: Protecting Systems with Data and Algorithms$2,223$2,106 -
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide$980$960 -
90折
$2,484Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (Pearson IT Cybersecurity Curriculum (ITCC)) -
Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Simula SpringerBriefs on Computing)$1,280$1,254 -
VIP 95折
Advanced Infrastructure Penetration Testing$1,820$1,729 -
Foundations and Practice of Security: 10th International Symposium, Fps 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers$2,430$2,381 -
VIP 95折
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities$1,380$1,311 -
The Beast: a.k.a. IT Security$1,110$1,087 -
VIP 95折
PCI DSS 3.2 - A Comprehensive Understanding to Effectively Achieve PCI DSS Compliance$3,150$2,992 -
Practical Information Security: A Competency-Based Education Course$3,770$3,694 -
90折
$1,575Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer (Paperback) -
VIP 95折
New Solutions for Cybersecurity$1,200$1,140 -
Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
50折
$699Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics -
60折
$888Practical Mobile Forensics - Third Edition -
Phishing Attacks: Advanced Attack Techniques$1,500$1,470 -
Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings (Lecture Notes ... and Telecommunications Engineering)$2,430$2,381 -
VIP 95折
Concepts and Case Studies in Threat Management$8,410$7,989 -
80折
$1,184Mobile Forensics Cookbook -
VIP 95折
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation (Paperback)$1,800$1,710 -
Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, ... (Lecture Notes in Computer Science)$4,560$4,468 -
60折
$618Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations -
Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management$1,370$1,342 -
Security, Privacy, and Anonymity in Computation, Communication, and Storage: 10th International Conference, SpaCCS 2017, Guangzhou, China, December ... (Lecture Notes in Computer Science)$2,430$2,381 -
Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
80折
$1,088Iot Penetration Testing Cookbook