資訊安全 / Penetration-test
相關書籍
-
A National Strategy to Combat Identity Theft (Paperback)$800$784 -
50折
$1,400Information Technology Control and Audit, 4/e (Hardcover) -
VIP 95折
Data Protection from Insider Threats (Synthesis Lectures on Data Management)$1,390$1,321 -
50折
$1,150CISSP: Certified Information Systems Security Professional Study Guide, 6/e (Paperback) -
Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (Special Publication 800-63-1)$740$725 -
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations: National Institute of Standards and Technology Special Publication 800-137$770$755 -
NIST Handbook 150-17, NVLAP (National Voluntary Laboratory Accreditation Program) Cryptographic and Security Testing$810$794 -
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of ... (Special Publication 800-126 Revision 2)$850$833 -
60折
$1,260Mastering Windows Network Forensics and Investigation, 2/e (污漬特價) -
VIP 95折
Enhancing Information Security and Privacy: Combining Biometrics & Cryptography (Paperback)$1,590$1,511 -
VIP 95折
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security (Paperback)$1,980$1,881 -
80折
$1,680SQL Injection Attacks and Defense, 2/e (Paperback) -
VIP 95折
Network Forensics: Tracking Hackers through Cyberspace (Hardcover)$2,400$2,280 -
80折
$1,584Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides (Paperback) -
60折
$1,320CCNP Security FIREWALL 642-618 Official Cert Guide (Hardcover) -
VIP 95折
Managing the Insider Threat: No Dark Corners (Hardcover)$6,350$6,033 -
Semantic Web Security: A Privacy-Enhanced Usage Control Model$1,240$1,215 -
60折
$948Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack (Paperback) -
Cyber Forensics: From Data to Digital Evidence (Hardcover)$2,710$2,656 -
Side Channel Attack Prevention$2,170$2,127 -
Honeypots in Network Security: How to monitor and keep track of the newest cyber attacks by trapping hackers (Paperback)$2,275$2,230 -
A Survey of Data Leakage Detection and Prevention Solutions (Paperback)$2,430$2,381 -
Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing)$6,420$6,292 -
VIP 95折
Comptia Security+ Myitcertificationlabs Student Access Code Card (Sy0-301)$2,070$1,967 -
ROLE MINING IN BUSINESS: TAMING ROLE-BASED ACCESS CONTROL ADMINISTRATION$4,390$4,302 -
60折
$1,260Windows Forensic Analysis Toolkit : Advanced Analysis Techniques for Windows 7, 3/e (Paperback) -
VIP 95折
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Hardcover)$2,440$2,318 -
An Introduction to DDoS Attacks and Defense Mechanisms: An Analyst's Handbook (Paperback)$3,300$3,234 -
Privacy Impact Assessment (Hardcover)$8,760$8,585 -
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS (Hardcover)$4,540$4,449