資訊安全 / Penetration-test
相關書籍
-
Encrypted Email: The History and Technology of Message Privacy (SpringerBriefs in Computer Science)$2,430$2,381 -
Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings (Communications in Computer and Information Science)$2,430$2,381 -
VIP 95折
Touchless Fingerprint Biometrics (Series in Security, Privacy and Trust)$6,520$6,194 -
Trust, Privacy and Security in Digital Business: 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
80折
$1,716Advanced Malware Analysis(Paperback) -
VIP 95折
The Complete Guide for CPP Examination Preparation, 2/e(Hardcover)$3,600$3,420 -
Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los ... (Lecture Notes in Computer Science)$2,430$2,381 -
Network Science and Cybersecurity (Advances in Information Security)$2,480$2,430 -
VIP 95折
Risk Analysis and Security Countermeasure Selection, 2/e(Hardcover)$6,220$5,909 -
80折
$2,880Vehicular Ad Hoc Network Security and Privacy (Hardcover) -
VIP 95折
Security Planning: An Applied Approach$3,560$3,382 -
VIP 90折
CraftinCrafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan (Paperback)$1,567$1,485 -
VIP 95折
Intelligence-Based Security in Private Industry Hardcover$2,460$2,337 -
VIP 95折
Python Web Penetration Testing Cookbook$1,820$1,729 -
Cyber Security: Analytics, Technology and Automation (Intelligent Systems, Control and Automation: Science and Engineering)$6,840$6,703 -
VIP 95折
Multilevel Modeling of Secure Systems in QoP-ML (Hardcover)$2,880$2,736 -
VIP 95折
Cyber-Physical Attacks: A Growing Invisible Threat (Paperback)$1,750$1,662 -
Protecting Privacy in Data Release (Advances in Information Security)$4,540$4,449 -
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis$4,450$4,361 -
VIP 95折
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... in Information and Communication Technology)$4,740$4,503 -
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats (Paperback)$3,310$3,243 -
VIP 95折
Securing Systems: Applied Security Architecture and Threat Models (Hardcover)$2,310$2,194 -
VIP 95折
Official (ISC)2 Guide to the CISSP-ISSMP CBK, 2/e (Hardcover)$3,590$3,410 -
Smart Grid Security (SpringerBriefs in Cybersecurity)$2,430$2,381 -
VIP 95折
Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,580$2,451 -
VIP 95折
Learning Android Forensics$2,000$1,900 -
The Tao Of Open Source Intelligence$1,960$1,920 -
80折
$1,680Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques (Paperback) -
Foundations and Practice of Security: 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Hardcover$5,450$5,177