資訊安全 / Penetration-test
相關書籍
-
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity (Lecture Notes in Computer Science)$2,430$2,381 -
$354軟件安全分析與應用 -
VIP 95折
Cyberspace and Cybersecurity, Second Edition$3,300$3,135 -
VIP 95折
Network Security through Data Analysis: From Data to Action, 2/e$1,930$1,833 -
VIP 95折
Anomaly Detection as a Service: Challenges, Advances, and Opportunities$2,450$2,327 -
VIP 95折
Anomaly Detection As a Service: Challenges, Advances, and Opportunities (Synthesis Lectures on Information Security, Privacy, and Trust)$3,060$2,907 -
SCION: A Secure Internet Architecture (Information Security and Cryptography)$2,430$2,381 -
VIP 95折
Certified Ethical Hacker (CEH) Version 9 uCertify Labs Access Card (2nd Edition) (Certification Guide)$4,880$4,636 -
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Cybercrime and Digital Forensics: An Introduction$3,200$3,040 -
VIP 95折
Web Application Firewalls: A Practical Approach$2,280$2,166 -
Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Intrusion Detection Networks: A Key to Collaborative Security$2,550$2,422 -
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level$7,200$7,056 -
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Guide to Digital Forensics: A Concise and Practical Introduction (SpringerBriefs in Computer Science)$2,620$2,567 -
Predictive Computing and Information Security$4,910$4,811 -
VIP 95折
What Every Engineer Should Know About Cyber Security and Digital Forensics$7,620$7,239 -
75折
$355代碼虛擬與自動化分析 -
Computer Safety, Reliability, and Security: SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Security Operations Center - Analyst Guide: SIEM Technology, Use Cases and Practices$2,370$2,322 -
VIP 95折
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools (Computer Communications and Networks)$3,940$3,743 -
50折
$990Intelligence-Driven Incident Response: Outwitting the Adversary -
Security and Trust Management: 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Advances in User Authentication (Infosys Science Foundation Series)$3,940$3,743 -
VIP 95折
Policies & Procedures for Data Security: A Complete Manual for Computer Systems and Networks$9,190$8,730 -
85折
資安風險評估指南 (Network Security Assessment, 3/e)$780$663 -
VIP 95折
Intrusion Detection and Prevention for Mobile Ecosystems (Series in Security, Privacy and Trust)$6,580$6,251 -
Hash Crack: Password Cracking Manual (v2.0)$940$921