資訊安全 / Penetration-test
相關書籍
-
VIP 90折
Certified Ethical Hacker (Ceh) Study Guide: In-Depth Guidance and Practice (Paperback)$2,251$2,133 -
VIP 95折
From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research$2,160$2,052 -
The Complete Ghidra Mastery: A Structured Guide to Reverse Engineering$1,240$1,215 -
Availability, Reliability and Security: Ares 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I$3,200$3,136 -
Availability, Reliability and Security: Ares 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II$3,200$3,136 -
Availability, Reliability and Security: Ares 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part IV$3,200$3,136 -
Availability, Reliability and Security: Ares 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part III$3,200$3,136 -
Availability, Reliability and Security: Ares 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II$3,200$3,136 -
Availability, Reliability and Security: 20th International Conference, Ares 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II$3,390$3,322 -
Availability, Reliability and Security: Ares 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I$2,820$2,763 -
Availability, Reliability and Security: 20th International Conference, Ares 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I$3,390$3,322 -
VIP 95折
Integrating Advanced Technologies for Enhanced Security and Efficiency$9,050$8,597 -
Collaborative Computing: Networking, Applications and Worksharing: 20th Eai International Conference, Collaboratecom 2024, Wuzhen, China, November 14-$4,160$4,076 -
Collaborative Computing: Networking, Applications and Worksharing: 20th Eai International Conference, Collaboratecom 2024, Wuzhen, China, November 14-$4,160$4,076 -
Collaborative Computing: Networking, Applications and Worksharing: 20th Eai International Conference, Collaboratecom 2024, Wuzhen, China, November 14-$4,160$4,076 -
Burp Suite Extender: Beyond The GUI$810$793 -
VIP 95折
Security Framework and Defense Mechanisms for Iot Reactive Jamming Attacks$5,850$5,557 -
Computational Science and Computational Intelligence: 11th International Conference, Csci 2024, Las Vegas, Nv, Usa, December 11-13, 2024, Proceedings,$3,580$3,508 -
VIP 95折
Counterterrorism and Cybersecurity: Total Information Awareness$2,480$2,356 -
Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide$2,620$2,567 -
VIP 95折
Cyber Defense: Best Practices for Digital Safety (Hardcover)$2,920$2,774 -
VIP 95折
Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, Dimva 2025, Graz, Austria, July 9-11, 2025, Proceedi$3,360$3,192 -
VIP 95折
Perturbation Based Privacy in Crowdsensing$8,260$7,847 -
Learn Burp Suite: From Interception to Strategic Exploitation$810$793 -
OpenVAS Unleashed: Harnessing the Power of Cybersecurity Assessment$1,240$1,215 -
Master Isa/Iec 62443: Essential Security Framework for Industrial Systems$940$921 -
Cybersecurity, Cybercrimes, and Smart Emerging Technologies: Proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Sma$7,230$7,085 -
VIP 95折
Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, Dimva 2025, Graz, Austria, July 9-11, 2025, Proceedi$2,970$2,821 -
Information Security and Privacy: 30th Australasian Conference, Acisp 2025, Wollongong, Nsw, Australia, July 14-16, 2025, Proceedings, Part III$3,390$3,322 -
Digital Deception: How Public Access and False MFA Broke the Internet$1,010$989