資訊安全 / Penetration-test
相關書籍
-
60折
$2,700Computer and Information Security Handbook, (美國原版)(書角損傷) -
VIP 95折
Internet Searches for Vetting, Investigations, and Open-Source Intelligence$4,120$3,914 -
VIP 95折
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition$1,980$1,881 -
VIP 95折
Preventing Digital Extortion$1,270$1,207 -
VIP 95折
Guide to Computer Network Security (Computer Communications and Networks)$3,530$3,354 -
50折
$900Defensive Security Handbook: Best Practices for Securing Infrastructure -
VIP 95折
Secure Web Application Deployment using OWASP Standards: An expert way of Secure Web Application deployment$500$475 -
VIP 95折
Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, ... in Computer and Information Science)$2,410$2,290 -
VIP 95折
The Endpoint Security Paradox: Realising Implementation Success$760$722 -
VIP 95折
How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet)$870$827 -
VIP 95折
Mathematics and Computing: Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings (Communications in Computer and Information Science)$2,410$2,290 -
VIP 95折
Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)$4,300$4,085 -
VIP 95折
Introduction to Computer Networks and Cybersecurity$2,980$2,831 -
VIP 95折
Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of ... (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Detecting and Mitigating Robotic Cyber Security Risks (Advances in Information Security, Privacy, and Ethics)$8,970$8,522 -
VIP 95折
Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)$1,750$1,663 -
VIP 95折
Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Advanced Computing and Systems for Security: Volume Four (Advances in Intelligent Systems and Computing)$2,410$2,290 -
VIP 95折
Advanced Computing and Systems for Security: Volume Three (Advances in Intelligent Systems and Computing)$2,410$2,290 -
VIP 95折
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)$6,400$6,080 -
80折
$960Windows Virus and Malware Troubleshooting -
VIP 95折
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Feistel Ciphers: Security Proofs and Cryptanalysis$7,920$7,524 -
VIP 95折
Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, ... Part II (Lecture Notes in Computer Science)$2,410$2,290 -
VIP 95折
Walling Out the Insiders: Controlling Access to Improve Organizational Security$3,800$3,610 -
VIP 95折
Information Security of Highly Critical Wireless Networks (SpringerBriefs in Computer Science)$2,600$2,470 -
VIP 95折
Strategic A2/AD in Cyberspace$5,090$4,836 -
VIP 95折
Strategic A2/AD in Cyberspace$1,790$1,701