資訊安全 / Penetration-test
相關書籍
-
VIP 95折
Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise$2,360$2,242 -
60折
$1,176Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Paperback) -
VIP 95折
Network and System Security: 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings (Lecture Notes in Computer Science)$2,360$2,242 -
VIP 95折
Algebraic Cryptanalysis$10,960$10,412 -
VIP 95折
Advanced Research in Data Privacy (Studies in Computational Intelligence)$4,400$4,180 -
VIP 95折
Writing Common Criteria Documentation$950$903 -
80折
$1,680Hacking and Penetration Testing with Low Power Devices (Paperback) -
$147智能手機取證(高等院校信息安全專業系列教材) -
VIP 95折
Case Studies in Secure Computing: Achievements and Trends (Hardcover)$3,465$3,292 -
VIP 95折
Computer Forensics: A Real World Guide$3,020$2,869 -
VIP 95折
Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture ... Computer Science / Security and Cryptology)$2,400$2,280 -
VIP 95折
Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Lecture Notes in Computer Science)$2,400$2,280 -
VIP 95折
Measuring and Managing Information Risk: A FAIR Approach$1,900$1,805 -
VIP 95折
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats$2,210$2,100 -
VIP 95折
Computer Safety, Reliability, and Security: 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings (Lecture Notes in Computer Science)$2,400$2,280 -
$1,352Cyberwarfare: Information Operations in a Connected World (Information Systems Security & Assurance) -
$1,137Corporate Computer Security, 4/e (IE-Paperback) -
VIP 95折
Ethical Hacking and Penetration Testing Guide (Paperback)$3,210$3,050 -
VIP 95折
Social Engineering in IT Security: Tools, Tactics, and Techniques$1,870$1,777 -
VIP 95折
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings (Lecture Notes in Computer Science)$2,400$2,280 -
VIP 95折
Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings (Lecture Notes in Computer Science)$2,400$2,280 -
80折
$1,744Incident Response & Computer Forensics, 3/e(Paperback) -
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder(Paperback)$760$745 -
VIP 95折
Cyber Crime and Cyber Terrorism Investigator's Handbook$1,900$1,805 -
VIP 95折
Hackers Underground Knowledge: Quick and easy way to learn secret hacker techniques$550$523 -
50折
$550CEH Certified Ethical Hacker Practice Exams, 2/e (Paperback) -
VIP 95折
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)$2,500$2,375 -
50折
$1,400Official (ISC)2 Guide to the CCFP CBK (Hardcover) -
VIP 95折
Practical Mobile Forensics$2,260$2,147 -
VIP 95折
Fault Analysis in Cryptography (Information Security and Cryptography)$4,490$4,266