資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Python Penetration Testing Cookbook$1,510$1,434 -
Network Security Metrics$5,690$5,576 -
Surveillance in Action: Technologies for Civilian, Military and Cyber Surveillance (Advanced Sciences and Technologies for Security Applications)$7,990$7,830 -
VIP 95折
Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised ... in Information and Communication Technology)$2,580$2,451 -
VIP 95折
Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations$2,610$2,479 -
VIP 95折
CompTIA Complete Cybersecurity Study Guide 2-Book Set: Exam SY0-501 and Exam CSA-001$3,630$3,448 -
80折
$2,880Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications (Wiley - IEEE) -
80折
$1,320Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information -
Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings (Communications in Computer and Information Science)$2,430$2,381 -
VIP 95折
Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide)$2,350$2,232 -
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Cyberspace and Cybersecurity, Second Edition$3,300$3,135 -
VIP 90折
Network Security through Data Analysis: From Data to Action, 2/e$1,833$1,737 -
VIP 95折
Anomaly Detection as a Service: Challenges, Advances, and Opportunities$2,460$2,337 -
VIP 95折
Anomaly Detection As a Service: Challenges, Advances, and Opportunities (Synthesis Lectures on Information Security, Privacy, and Trust)$3,070$2,916 -
SCION: A Secure Internet Architecture (Information Security and Cryptography)$2,430$2,381 -
VIP 95折
Certified Ethical Hacker (CEH) Version 9 uCertify Labs Access Card (2nd Edition) (Certification Guide)$4,900$4,655 -
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Cybercrime and Digital Forensics: An Introduction$2,860$2,717 -
VIP 95折
Web Application Firewalls: A Practical Approach$2,280$2,166 -
Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Intrusion Detection Networks: A Key to Collaborative Security$2,280$2,166 -
VIP 95折
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level$5,910$5,614 -
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Guide to Digital Forensics: A Concise and Practical Introduction (SpringerBriefs in Computer Science)$2,620$2,567 -
Predictive Computing and Information Security$4,930$4,831 -
VIP 95折
What Every Engineer Should Know About Cyber Security and Digital Forensics$6,730$6,393 -
Computer Safety, Reliability, and Security: SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Security Operations Center - Analyst Guide: SIEM Technology, Use Cases and Practices$2,380$2,332