資訊安全 / Penetration-test
相關書籍
-
Mobile Phone Security and Forensics: A Practical Approach$4,530$4,439 -
VIP 95折
Advanced Penetration Testing for HighlySecured Environments 2/e$2,330$2,213 -
Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry$2,450$2,401 -
Critical Information Infrastructures Security: 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Information Security Applications: 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Building a Pentesting Lab for Wireless Networks$1,810$1,719 -
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (Lecture Notes in Computer Science)$2,620$2,567 -
Selected Areas in Cryptography - SAC 2015: 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Mobile Application Penetration Testing(Paperback)$2,000$1,900 -
VIP 95折
CISA: Certified Information Systems Auditor Study Guide, 4/e(Paperback)$2,330$2,213 -
VIP 95折
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis$2,280$2,166 -
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools (Paperback)$2,090$2,048 -
VIP 95折
Official (ISC)2 Guide to the CISSP-ISSEP CBK, Second Edition ((Isc)2 Press)$2,750$2,612 -
Boolean Functions and Their Applications in Cryptography(Hardcover)$5,670$5,556 -
$234網絡隱蔽通信及其檢測技術(電子資訊前沿技術叢書) -
60折
$990Learning Network Forensics (Paperback) -
VIP 95折
Implementing Digital Forensic Readiness: From Reactive to Proactive Process(Paperback)$2,280$2,166 -
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition$4,760$4,664 -
VIP 95折
Cryptography and Network Security: Principles and Practice (7th Edition)$7,490$7,115 -
VIP 95折
Sensitive Security Information, Certified® (SSI) Body of Knowledge (Center for National Threat Assessment)$4,350$4,132 -
Public-Key Cryptography - PKC 2016, Part I(Paperback)$2,430$2,381 -
Sicherheitsaspekte von Mobiltelefonen: Erkennung und Visualisierung von Angriffsvektoren (BestMasters) (German Edition)$2,280$2,234 -
Graphical Models for Security(Paperback)$2,040$1,999 -
50折
$1,990Security without Obscurity: A Guide to PKI Operations (Hardcover) -
Industrial Espionage and Technical Surveillance Counter Measurers$4,150$4,067 -
VIP 95折
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Preservation of Digital Evidence (Paperback)$2,600$2,470 -
Cryptographic Attacks: Computer Security Exploits(Paperback)$2,280$2,234 -
Sharing Big Data Safely: Managing Data Security$1,230$1,205 -
80折
$1,960The Information Systems Security Officer's Guide : Establishing and Managing a Cyber Security Program, 3/e(Paperback)