資訊安全 / Penetration-test
相關書籍
-
Critical Information Infrastructures Security: 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Information Security Applications: 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Building a Pentesting Lab for Wireless Networks$1,820$1,729 -
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Lecture Notes in Computer Science)$2,620$2,567 -
Selected Areas in Cryptography - SAC 2015: 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Mobile Application Penetration Testing(Paperback)$2,000$1,900 -
VIP 95折
CISA: Certified Information Systems Auditor Study Guide, 4/e(Paperback)$2,330$2,213 -
VIP 95折
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis$2,280$2,166 -
VIP 95折
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools (Paperback)$2,090$1,985 -
VIP 95折
Official (ISC)2 Guide to the CISSP-ISSEP CBK, Second Edition ((Isc)2 Press)$2,460$2,337 -
Boolean Functions and Their Applications in Cryptography(Hardcover)$5,690$5,576 -
60折
$990Learning Network Forensics (Paperback) -
VIP 95折
Implementing Digital Forensic Readiness: From Reactive to Proactive Process(Paperback)$2,280$2,166 -
VIP 95折
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition$3,960$3,762 -
VIP 95折
Cryptography and Network Security: Principles and Practice (7th Edition)$7,520$7,144 -
VIP 95折
Sensitive Security Information, Certified® (SSI) Body of Knowledge (Center for National Threat Assessment)$3,860$3,667 -
Public-Key Cryptography - PKC 2016, Part I(Paperback)$2,430$2,381 -
Sicherheitsaspekte von Mobiltelefonen: Erkennung und Visualisierung von Angriffsvektoren (BestMasters) (German Edition)$2,280$2,234 -
Graphical Models for Security(Paperback)$2,050$2,009 -
50折
$1,990Security without Obscurity: A Guide to PKI Operations (Hardcover) -
Industrial Espionage and Technical Surveillance Counter Measurers$4,160$4,076 -
VIP 95折
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Preservation of Digital Evidence (Paperback)$2,610$2,479 -
Cryptographic Attacks: Computer Security Exploits(Paperback)$2,290$2,244 -
Sharing Big Data Safely: Managing Data Security$1,230$1,205 -
80折
$1,960The Information Systems Security Officer's Guide : Establishing and Managing a Cyber Security Program, 3/e(Paperback) -
VIP 90折
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems (Paperback)$1,567$1,485 -
Malware: Malware Detection & Threats Made Easy!$950$931 -
Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers (Communications in Computer and Information Science)$2,430$2,381 -
VIP 95折
Security Requirements Engineering: Designing Secure Socio-Technical Systems (Information Systems)$2,240$2,128 -
VIP 95折
Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover)$3,530$3,353