資訊安全 / Penetration-test
相關書籍
-
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis$4,430$4,341 -
VIP 95折
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... in Information and Communication Technology)$4,720$4,484 -
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats (Paperback)$3,300$3,234 -
VIP 95折
Securing Systems: Applied Security Architecture and Threat Models (Hardcover)$2,310$2,194 -
Official (ISC)2 Guide to the CISSP-ISSMP CBK, 2/e (Hardcover)$4,300$4,214 -
Smart Grid Security (SpringerBriefs in Cybersecurity)$2,430$2,381 -
VIP 95折
Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,570$2,441 -
VIP 95折
Learning Android Forensics$2,000$1,900 -
$474網絡安全監控實戰(深入理解事件檢測與響應) -
The Tao Of Open Source Intelligence$1,950$1,911 -
80折
$1,680Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques (Paperback) -
Foundations and Practice of Security: 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Hardcover$6,630$6,497 -
80折
$1,680Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges (Paperback) -
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Railway Infrastructure Security (Topics in Safety, Risk, Reliability and Quality)$4,530$4,439 -
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, ... Papers (Lecture Notes in Computer Science)$2,430$2,381 -
60折
$693Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails (Paperback) -
Information Security and Cryptology - ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Business Espionage: Risks, Threats, and Countermeasures Paperback$2,280$2,166 -
VIP 95折
Introduction to Social Media Investigation: A Hands-on Approach (Paperback)$2,280$2,166 -
VIP 95折
Official (ISC)2 Guide to the CISSP CBK, 4/e (Hardcover)$2,970$2,821 -
Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010 (Edition kes) (German Edition)$3,260$3,194 -
50折
$660CISSP Practice Exams, 3/e (Paperback) -
VIP 95折
Mastering Nmap Scripting Engine$1,810$1,719 -
VIP 95折
Python Penetration Testing Essentials$1,330$1,263 -
50折
$799Mastering Wireless Penetration Testing for Highly-Secured Environments (Paperback) -
Cyber Defense and Situational Awareness (Advances in Information Security)$4,530$4,439 -
Detecting Peripheral-based Attacks on the Host Memory (T-Labs Series in Telecommunication Services)$4,530$4,439