資訊安全 / Penetration-test
相關書籍
-
80折
$1,680Business Continuity and Disaster Recovery for InfoSec Managers (Paperback) -
50折
$620Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications -
50折
$900Network Security Evaluation Using the NSA IEM -
50折
$850Extreme Exploits : Advanced Defenses Against Hardcore Hacks -
17折
$399Network Defense and Countermeasures: Principles and Practices (Paperback) -
VIP 95折
The Database Hacker's Handbook: Defending Database Servers$1,750$1,663 -
80折
$1,320The Software Vulnerability Guide -
60折
$1,290Protect Your Windows Network: From Perimeter to Data (Paperback) -
19折
$199Phishing: Cutting the Identity Theft Line -
VIP 95折
File System Forensic Analysis (Paperback)$2,800$2,660 -
50折
$825Intrusion Prevention And Active Response: Deploying Network And Host Ips -
50折
$775Black Hat Physical Device Security -
90折
$1,485Forensic Discovery (Hardcover) -
23折
$399Computer Forensics: Computer Crime Scene Investigation, 2/e -
50折
$825CCSP CSI Exam Certification Guide, 2/e (Hardcover) -
50折
$375Security+ Exam Cram 2 Lab Manual (Paperback) -
VIP 90折
Managing Security with Snort and IDS Tools$1,254$1,188 -
80折
$1,980The Tao Of Network Security Monitoring: Beyond Intrusion Detection -
50折
$880Wi-Foo : The Secrets of Wireless Hacking (Paperback) -
50折
$680Hardening Network Infrastructure -
50折
$875The Shellcoder's Handbook : Discovering and Exploiting Security Holes (Paperback) -
20折
$399Security Sage's Guide to Hardening the Network Infrastructure -
50折
$1,050Digital Evidence and Computer Crime, 2/e (Hardcover) -
VIP 95折
Innocent Code : A Security Wake-Up Call for Web Programmers$2,100$1,995 -
19折
$399Security Assessment: Case Studies for Implementing the NSA IAM -
Fundamentals of Network Security (Paperback)$1,400$1,372 -
50折
$660The Effective Incident Response Team -
VIP 90折
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More (Paperback)$2,494$2,363 -
18折
$399CCIE Practical Studies: Security (Hardcover) -
60折
$1,050Intrusion Detection with Snort