資訊安全 / Penetration-test
相關書籍
-
Network and Application Security: Fundamentals and Practices$9,910$9,712 -
VIP 95折
Cyber Crime Investigator's Field Guide, Second Edition$7,650$7,268 -
Digital Forensics$3,290$3,224 -
ModSecurity Handbook, Second Edition$2,070$2,029 -
VIP 95折
Threat Level Red: Cybersecurity Research Programs of the U.S. Government$3,840$3,648 -
VIP 95折
A History of Cyber Security Attacks: 1980 to Present$2,500$2,375 -
Responsive Security: Be Ready to Be Secure$9,530$9,339 -
VIP 95折
Penetration Testing Bootcamp$1,820$1,729 -
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings (Communications in Computer and Information Science)$2,430$2,381 -
VIP 95折
Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communications$2,610$2,480 -
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level$2,430$2,381 -
A Multidisciplinary Introduction to Information Security$4,160$4,077 -
VIP 95折
Guide: Reporting on an Entity's Cybersecurity Risk Management Program and Controls, 2017 (AICPA)$3,340$3,173 -
Hacking: The Complete Beginner?s Guide To Computer Hacking: More On How To Hack Networks and Computer Systems, Information Gathering, Password ... Online anonymity, IP Address, Privacy)$810$794 -
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems: oct 2015$800$784 -
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science)$3,010$2,950 -
Federal Information Processing Standards Publications: Pubs 140-2, 180-4, 186-4, 199 & 200$890$872 -
60折
$2,700Computer and Information Security Handbook, (美國原版)(書角損傷) -
Internet Searches for Vetting, Investigations, and Open-Source Intelligence$4,160$4,077 -
VIP 95折
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition$2,000$1,900 -
VIP 95折
Preventing Digital Extortion$1,280$1,216 -
VIP 95折
Guide to Computer Network Security (Computer Communications and Networks)$3,560$3,382 -
50折
$900Defensive Security Handbook: Best Practices for Securing Infrastructure -
Secure Web Application Deployment using OWASP Standards: An expert way of Secure Web Application deployment$500$490 -
Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, ... in Computer and Information Science)$2,430$2,381 -
The Endpoint Security Paradox: Realising Implementation Success$770$755 -
How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet)$880$862 -
Mathematics and Computing: Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings (Communications in Computer and Information Science)$2,430$2,381