資訊安全 / Penetration-test
相關書籍
-
Innovative Security Solutions for Information Technology and Communications(Paperback)$2,430$2,381 -
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)$7,990$7,830 -
VIP 95折
Learning iOS Penetration Testing(Paperback)$1,700$1,615 -
80折
$2,080Security Controls Evaluation, Testing, and Assessment Handbook (Paperback) -
Recent Advances in Computational Intelligence in Defense and Security (Studies in Computational Intelligence)$6,870$6,732 -
VIP 95折
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections (Synthesis Lectures on Information Security, Privacy, and Trust)$1,700$1,615 -
VIP 95折
Principles of Computer Security, 4/e (Paperback)$4,760$4,522 -
80折
$1,320Security for Web Developers: Using JavaScript, HTML, and CSS (Paperback) -
Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers (Lecture ... and Telecommunications Engineering)$3,080$3,018 -
50折
$199Hacking For Dummies, 5/e (Paperback) -
VIP 95折
The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure (Hardcover)$5,910$5,614 -
80折
$1,120Cyber Security Awareness for CEOs and Management (Paperback) -
The Global Cyber-Vulnerability Report (Terrorism, Security, and Computation)$4,540$4,449 -
Building Secure Defenses Against Code-Reuse Attacks (SpringerBriefs in Computer Science)$2,430$2,381 -
VIP 95折
Digital Forensics: Threatscape and Best Practices (Paperback)$1,750$1,662 -
Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Search Warrant Templates: Social Media and Applications$1,140$1,117 -
Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
60折
$1,260CISSP Study Guide, 3/e (Paperback) -
80折
$1,680Google Hacking for Penetration Testers, 3/e (Paperback) -
VIP 95折
Automated Software Diversity (Synthesis Lectures on Information Security, Privacy, and Trust)$1,390$1,320 -
VIP 95折
Honeypots and Routers: Collecting Internet Attacks (Hardcover)$2,600$2,470 -
VIP 95折
A Holistic Approach to Measuring the Security of SCADA Systems(Hardcover)$3,370$3,201 -
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Network and System Security: 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide and SSCP CBK Set(Paperback)$4,290$4,075 -
VIP 95折
Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected ... in Information and Communication Technology)$2,580$2,451 -
VIP 95折
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers (IFIP Advances in Information and Communication Technology)$2,580$2,451 -
VIP 95折
Theoretical and Experimental Methods for Defending Against DDOS Attacks(Paperback)$2,610$2,479 -
Risk Assessment and Risk-Driven Testing: Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers (Lecture Notes in Computer Science)$2,050$2,009