資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Guide: Reporting on an Entity's Cybersecurity Risk Management Program and Controls, 2017 (AICPA)$3,330$3,163 -
Hacking: The Complete Beginner?s Guide To Computer Hacking: More On How To Hack Networks and Computer Systems, Information Gathering, Password ... Online anonymity, IP Address, Privacy)$810$793 -
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems: oct 2015$790$774 -
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science)$3,000$2,940 -
Federal Information Processing Standards Publications: Pubs 140-2, 180-4, 186-4, 199 & 200$890$872 -
60折
$2,700Computer and Information Security Handbook, (美國原版)(書角損傷) -
Internet Searches for Vetting, Investigations, and Open-Source Intelligence$4,340$4,253 -
VIP 95折
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition$2,000$1,900 -
VIP 95折
Preventing Digital Extortion$1,280$1,216 -
VIP 95折
Guide to Computer Network Security (Computer Communications and Networks)$3,550$3,372 -
50折
$900Defensive Security Handbook: Best Practices for Securing Infrastructure -
Secure Web Application Deployment using OWASP Standards: An expert way of Secure Web Application deployment$500$490 -
Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, ... in Computer and Information Science)$2,430$2,381 -
79折
MTA Security Fundamentals 網路安全管理 國際認證教戰手冊 (98-367)$250$197 -
The Endpoint Security Paradox: Realising Implementation Success$770$754 -
How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet)$880$862 -
Mathematics and Computing: Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings (Communications in Computer and Information Science)$2,430$2,381 -
Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)$4,330$4,113 -
VIP 95折
Introduction to Computer Networks and Cybersecurity$2,980$2,831 -
74折
$178網絡攻擊與漏洞利用:安全攻防策略(Network Attacks and Exploitation:A Framework) -
Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of ... (Lecture Notes in Computer Science)$2,430$2,381 -
Detecting and Mitigating Robotic Cyber Security Risks (Advances in Information Security, Privacy, and Ethics)$9,030$8,849 -
VIP 95折
Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)$1,750$1,662 -
Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Advanced Computing and Systems for Security: Volume Four (Advances in Intelligent Systems and Computing)$2,430$2,381 -
Advanced Computing and Systems for Security: Volume Three (Advances in Intelligent Systems and Computing)$2,430$2,381 -
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)$6,820$6,683 -
80折
$960Windows Virus and Malware Troubleshooting