資訊安全 / Penetration-test
相關書籍
-
Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)$4,340$4,123 -
VIP 95折
Introduction to Computer Networks and Cybersecurity$2,980$2,831 -
Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of ... (Lecture Notes in Computer Science)$2,430$2,381 -
Detecting and Mitigating Robotic Cyber Security Risks (Advances in Information Security, Privacy, and Ethics)$9,050$8,869 -
95折
$1,663Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback) -
Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Advanced Computing and Systems for Security: Volume Four (Advances in Intelligent Systems and Computing)$2,430$2,381 -
Advanced Computing and Systems for Security: Volume Three (Advances in Intelligent Systems and Computing)$2,430$2,381 -
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)$6,460$6,331 -
80折
$960Windows Virus and Malware Troubleshooting -
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Feistel Ciphers: Security Proofs and Cryptanalysis$8,260$7,847 -
Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, ... Part II (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Walling Out the Insiders: Controlling Access to Improve Organizational Security$4,010$3,810 -
Information Security of Highly Critical Wireless Networks (SpringerBriefs in Computer Science)$2,620$2,568 -
Strategic A2/AD in Cyberspace$5,140$5,037 -
Strategic A2/AD in Cyberspace$1,810$1,774 -
Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind (Internal Audit and IT Audit)$4,540$4,449 -
60折
$1,560Python: Penetration Testing for Developers -
VIP 95折
CEH Certified Ethical Hacker Bundle, Third Edition (All-In-One)$1,980$1,881 -
VIP 95折
CCNA Security 210-260 Pearson Ucertify Course and Textbook Bundle$4,930$4,684 -
VIP 95折
Network Security Assessment: Know Your Network 3/e$1,850$1,758 -
Blue Team Field Manual (BTFM) (RTFM)$810$794 -
Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach$5,310$5,204 -
VIP 95折
Open Source Intelligence Investigation: From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications)$8,260$7,847 -
VIP 95折
CISSP Cert Guide, Pearson uCertify Course, and uCertify Labs Bundle$5,640$5,358 -
iOS Application Pentesting Handbook 2$1,790$1,754 -
Android Application Pentesting Handbook 2$1,790$1,754