資訊安全 / Penetration-test
相關書籍
-
Information Security Policies, Procedures, and Standards: A Practitioner's Reference$7,200$7,056 -
23折
$299CEH v9: Certified Ethical Hacker Version 9 Practice Tests -
Social Media Investigation for Law Enforcement (Forensic Studies for Criminal Justice)$9,140$8,957 -
VIP 95折
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control$1,960$1,862 -
VIP 95折
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop(Hardcover)$8,790$8,351 -
VIP 95折
Analyzing and Securing Social Networks (Hardcover)$6,000$5,700 -
The Complete Guide to Cybersecurity Risks and Controls (Internal Audit and IT Audit)$6,460$6,331 -
Mobile Phone Security and Forensics: A Practical Approach$4,540$4,449 -
VIP 95折
Advanced Penetration Testing for HighlySecured Environments 2/e$2,340$2,223 -
Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry$2,450$2,328 -
Critical Information Infrastructures Security: 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Information Security Applications: 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Building a Pentesting Lab for Wireless Networks$1,820$1,729 -
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Lecture Notes in Computer Science)$2,620$2,568 -
Selected Areas in Cryptography - SAC 2015: 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Mobile Application Penetration Testing(Paperback)$2,000$1,900 -
95折
$2,214CISA: Certified Information Systems Auditor Study Guide, 4/e(Paperback) -
VIP 95折
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis$2,280$2,166 -
VIP 95折
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools (Paperback)$2,090$1,986 -
VIP 95折
Official (ISC)2 Guide to the CISSP-ISSEP CBK, Second Edition ((Isc)2 Press)$2,760$2,622 -
Boolean Functions and Their Applications in Cryptography(Hardcover)$5,690$5,576 -
60折
$990Learning Network Forensics (Paperback) -
VIP 95折
Implementing Digital Forensic Readiness: From Reactive to Proactive Process(Paperback)$2,280$2,166 -
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition$4,540$4,449 -
VIP 95折
Cryptography and Network Security: Principles and Practice (7th Edition)$7,520$7,144 -
VIP 95折
Sensitive Security Information, Certified® (SSI) Body of Knowledge (Center for National Threat Assessment)$4,160$3,952 -
Public-Key Cryptography - PKC 2016, Part I(Paperback)$2,430$2,381 -
Sicherheitsaspekte von Mobiltelefonen: Erkennung und Visualisierung von Angriffsvektoren (BestMasters) (German Edition)$2,280$2,234 -
Graphical Models for Security(Paperback)$2,050$2,009