資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems (Paperback)$1,650$1,567 -
Malware: Malware Detection & Threats Made Easy!$950$931 -
Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers (Communications in Computer and Information Science)$2,430$2,381 -
VIP 95折
Security Requirements Engineering: Designing Secure Socio-Technical Systems (Information Systems)$2,230$2,118 -
Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover)$4,220$4,135 -
Innovative Security Solutions for Information Technology and Communications(Paperback)$2,430$2,381 -
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)$7,970$7,810 -
VIP 95折
Learning iOS Penetration Testing(Paperback)$1,690$1,605 -
80折
$2,080Security Controls Evaluation, Testing, and Assessment Handbook (Paperback) -
Recent Advances in Computational Intelligence in Defense and Security (Studies in Computational Intelligence)$6,850$6,713 -
VIP 95折
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections (Synthesis Lectures on Information Security, Privacy, and Trust)$1,690$1,605 -
$299網絡安全技術及應用實踐教程 第2版 -
VIP 95折
Principles of Computer Security, 4/e (Paperback)$4,750$4,512 -
80折
$1,320Security for Web Developers: Using JavaScript, HTML, and CSS (Paperback) -
Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers (Lecture ... and Telecommunications Engineering)$3,080$3,018 -
50折
$199Hacking For Dummies, 5/e (Paperback) -
The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure (Hardcover)$7,200$7,056 -
80折
$1,120Cyber Security Awareness for CEOs and Management (Paperback) -
The Global Cyber-Vulnerability Report (Terrorism, Security, and Computation)$4,530$4,439 -
Building Secure Defenses Against Code-Reuse Attacks (SpringerBriefs in Computer Science)$2,430$2,381 -
Digital Forensics: Threatscape and Best Practices (Paperback)$1,750$1,715 -
Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Search Warrant Templates: Social Media and Applications$1,140$1,117 -
Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
60折
$1,260CISSP Study Guide, 3/e (Paperback) -
80折
$1,680Google Hacking for Penetration Testers, 3/e (Paperback) -
VIP 95折
Automated Software Diversity (Synthesis Lectures on Information Security, Privacy, and Trust)$1,390$1,320 -
VIP 95折
Honeypots and Routers: Collecting Internet Attacks (Hardcover)$2,600$2,470 -
VIP 95折
A Holistic Approach to Measuring the Security of SCADA Systems(Hardcover)$3,360$3,192 -
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings (Lecture Notes in Computer Science)$2,430$2,381