資訊安全 / Penetration-test
相關書籍
-
VIP 95折
CompTIA Security+ Certification Kit , 5th Edition (Exam SY0-501)$3,360$3,192 -
80折
$2,288Network Defense and Countermeasures: Principles and Practices (3rd Edition) (Pearson IT Cybersecurity Curriculum (ITCC)) -
$210高等學校網絡空間安全專業規劃教材:網絡安全習題詳解 -
Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Lecture Notes in Computer Science)$4,870$4,772 -
On the Physical Security of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)$4,530$4,439 -
Comprehensive Security for Data Centers and Mission Critical Facilities: (Including EMP Protection)$1,350$1,323 -
$474Web安全防護指南:基礎篇 -
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)$8,140$7,977 -
Industrial Espionage and Technical Surveillance Counter Measurers$4,230$4,145 -
80折
$1,184Practical Cyber Intelligence -
Inside Radio: An Attack and Defense Guide (Hardcover)$3,380$3,312 -
VIP 95折
Preventing Ransomware: Understand everything about digital extortion and its prevention$1,390$1,320 -
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats$2,860$2,802 -
80折
$1,680CISM Certified Information Security Manager All-in-One Exam Guide -
Adversary Detection For Cognitive Radio Networks (SpringerBriefs in Electrical and Computer Engineering)$2,430$2,381 -
VIP 95折
Machine Learning and Security: Protecting Systems with Data and Algorithms$2,340$2,223 -
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide$970$950 -
90折
$2,484Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (Pearson IT Cybersecurity Curriculum (ITCC)) -
Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
85折
$346碼書 : 編碼與解碼的戰爭 -
85折
$351Web 攻防之業務安全實戰指南 -
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Simula SpringerBriefs on Computing)$1,280$1,254 -
VIP 95折
Advanced Infrastructure Penetration Testing$1,810$1,719 -
Foundations and Practice of Security: 10th International Symposium, Fps 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers$2,430$2,381 -
VIP 95折
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities$1,380$1,311 -
85折
資安防禦指南|資訊安全架構實務典範 (Defensive Security Handbook: Best Practices for Securing Infrastructure)$580$493 -
The Beast: a.k.a. IT Security$1,100$1,078 -
PCI DSS 3.2 - A Comprehensive Understanding to Effectively Achieve PCI DSS Compliance$3,150$3,087 -
Practical Information Security: A Competency-Based Education Course$3,760$3,684 -
90折
$1,575Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer (Paperback)