資訊安全 / Penetration-test
相關書籍
-
Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Search Warrant Templates: Social Media and Applications$1,140$1,117 -
Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
60折
$1,260CISSP Study Guide, 3/e (Paperback) -
80折
$1,680Google Hacking for Penetration Testers, 3/e (Paperback) -
VIP 95折
Automated Software Diversity (Synthesis Lectures on Information Security, Privacy, and Trust)$1,390$1,321 -
VIP 95折
Honeypots and Routers: Collecting Internet Attacks (Hardcover)$2,600$2,470 -
VIP 95折
A Holistic Approach to Measuring the Security of SCADA Systems(Hardcover)$3,370$3,202 -
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Network and System Security: 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide and SSCP CBK Set(Paperback)$4,290$4,076 -
VIP 95折
Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected ... in Information and Communication Technology)$2,580$2,451 -
VIP 95折
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers (IFIP Advances in Information and Communication Technology)$2,580$2,451 -
VIP 95折
Theoretical and Experimental Methods for Defending Against DDOS Attacks(Paperback)$2,610$2,480 -
Risk Assessment and Risk-Driven Testing: Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers (Lecture Notes in Computer Science)$2,050$2,009 -
Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Mastering Python Forensics$1,700$1,615 -
VIP 95折
Security Operations Center: Building, Operating, and Maintaining your SOC (Paperback)$1,925$1,829 -
Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference$2,430$2,381 -
VIP 95折
IT-Revision, IT-Audit und IT-Compliance: Neue Ansätze für die IT-Prüfung (German Edition)$2,190$2,081 -
Digital Forensics Workbook: Hands-On Activities in Digital Forensics$2,610$2,558 -
Dynamic Secrets in Communication Security$2,430$2,381 -
Application Security in the ISO 27001: 2013 Environment$1,960$1,921 -
Cyber-Risk Management (SpringerBriefs in Computer Science)$3,580$3,508 -
50折
$990SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 2/e (Paperback) -
VIP 95折
Security Operations Management, 3/e(Paperback)$3,260$3,097 -
VIP 95折
Learning Penetration Testing with Python$2,000$1,900 -
VIP 95折
Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector(Paperback)$1,960$1,862