資訊安全 / Penetration-test
相關書籍
-
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level$2,430$2,381 -
VIP 95折
A Multidisciplinary Introduction to Information Security$3,650$3,467 -
VIP 95折
Guide: Reporting on an Entity's Cybersecurity Risk Management Program and Controls, 2017 (AICPA)$3,340$3,173 -
Hacking: The Complete Beginner?s Guide To Computer Hacking: More On How To Hack Networks and Computer Systems, Information Gathering, Password ... Online anonymity, IP Address, Privacy)$810$793 -
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems: oct 2015$800$784 -
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science)$3,010$2,949 -
Federal Information Processing Standards Publications: Pubs 140-2, 180-4, 186-4, 199 & 200$890$872 -
60折
$2,700Computer and Information Security Handbook, (美國原版)(書角損傷) -
VIP 95折
Internet Searches for Vetting, Investigations, and Open-Source Intelligence$3,620$3,439 -
VIP 95折
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition$2,000$1,900 -
VIP 95折
Preventing Digital Extortion$1,280$1,216 -
VIP 95折
Guide to Computer Network Security (Computer Communications and Networks)$3,560$3,382 -
50折
$900Defensive Security Handbook: Best Practices for Securing Infrastructure -
Secure Web Application Deployment using OWASP Standards: An expert way of Secure Web Application deployment$500$490 -
Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, ... in Computer and Information Science)$2,430$2,381 -
The Endpoint Security Paradox: Realising Implementation Success$770$754 -
How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet)$880$862 -
Mathematics and Computing: Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings (Communications in Computer and Information Science)$2,430$2,381 -
Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)$4,340$4,123 -
VIP 95折
Introduction to Computer Networks and Cybersecurity$2,980$2,831 -
Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of ... (Lecture Notes in Computer Science)$2,430$2,381 -
Detecting and Mitigating Robotic Cyber Security Risks (Advances in Information Security, Privacy, and Ethics)$9,050$8,869 -
VIP 95折
Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)$1,750$1,662 -
Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Advanced Computing and Systems for Security: Volume Four (Advances in Intelligent Systems and Computing)$2,430$2,381 -
Advanced Computing and Systems for Security: Volume Three (Advances in Intelligent Systems and Computing)$2,430$2,381 -
VIP 95折
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)$5,610$5,329 -
80折
$960Windows Virus and Malware Troubleshooting