資訊安全 / Penetration-test
相關書籍
-
Test Results for Hardware Write Block Device: MyKey NoWrite (Firmware Version 1.05)$880$862 -
Automated Firewall Analytics: Design, Configuration and Optimization$4,540$4,449 -
Cybercrime and Cyber Warfare (Focus (Wiley))$6,390$6,262 -
VIP 95折
CCNA Security Lab Manual Version 1.2, 3/e (Paperback)$1,960$1,862 -
Basics of SQL injection Analysis, Detection and Prevention: Web Security$1,830$1,793 -
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies$910$892 -
Red Flags: Recognize and eliminate the risks in your RIA firm's Disaster Recovery, IT Compliance, and Cyber Security processes to safeguard your reputation and client trust.$780$764 -
VIP 95折
Official (ISC)2 Guide to the HCISPP CBK (Hardcover)$2,700$2,565 -
Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise$2,430$2,381 -
60折
$1,176Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Paperback) -
Network and System Security: 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Algebraic Cryptanalysis$11,310$11,084 -
Advanced Research in Data Privacy (Studies in Computational Intelligence)$4,540$4,449 -
Writing Common Criteria Documentation$980$960 -
80折
$1,680Hacking and Penetration Testing with Low Power Devices (Paperback) -
VIP 95折
Case Studies in Secure Computing: Achievements and Trends (Hardcover)$3,465$3,292 -
VIP 95折
Computer Forensics: A Real World Guide$3,110$2,955 -
Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture ... Computer Science / Security and Cryptology)$2,480$2,430 -
Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Lecture Notes in Computer Science)$2,480$2,430 -
VIP 95折
Measuring and Managing Information Risk: A FAIR Approach$1,960$1,862 -
VIP 95折
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats$2,280$2,166 -
Computer Safety, Reliability, and Security: 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings (Lecture Notes in Computer Science)$2,480$2,430 -
$1,352Cyberwarfare: Information Operations in a Connected World (Information Systems Security & Assurance) -
Corporate Computer Security, 4/e (IE-Paperback)$1,160$1,137 -
Ethical Hacking and Penetration Testing Guide (Paperback)$3,310$3,244 -
Social Engineering in IT Security: Tools, Tactics, and Techniques$1,820$1,784 -
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings (Lecture Notes in Computer Science)$2,480$2,430 -
Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings (Lecture Notes in Computer Science)$2,480$2,430 -
80折
$1,744Incident Response & Computer Forensics, 3/e(Paperback) -
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder(Paperback)$760$745