資訊安全 / Penetration-test
相關書籍
-
Test Results for Hardware Write Block Device: MyKey NoWrite (Firmware Version 1.05)$870$852 -
Automated Firewall Analytics: Design, Configuration and Optimization$4,530$4,439 -
Cybercrime and Cyber Warfare (Focus (Wiley))$6,370$6,242 -
VIP 95折
CCNA Security Lab Manual Version 1.2, 3/e (Paperback)$1,950$1,852 -
Basics of SQL injection Analysis, Detection and Prevention: Web Security$1,820$1,783 -
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies$910$891 -
Red Flags: Recognize and eliminate the risks in your RIA firm's Disaster Recovery, IT Compliance, and Cyber Security processes to safeguard your reputation and client trust.$780$764 -
VIP 95折
Official (ISC)2 Guide to the HCISPP CBK (Hardcover)$2,700$2,565 -
Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise$2,430$2,381 -
60折
$1,176Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Paperback) -
INTEGER ALGORITHMS IN CRYPTOLOGY AND INFORMATION ASSURANCE$6,670$6,536 -
Network and System Security: 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Algebraic Cryptanalysis$11,270$11,044 -
Advanced Research in Data Privacy (Studies in Computational Intelligence)$4,530$4,439 -
Writing Common Criteria Documentation$970$950 -
80折
$1,680Hacking and Penetration Testing with Low Power Devices (Paperback) -
$147智能手機取證(高等院校信息安全專業系列教材) -
VIP 95折
Case Studies in Secure Computing: Achievements and Trends (Hardcover)$3,465$3,291 -
VIP 95折
Computer Forensics: A Real World Guide$3,100$2,945 -
Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture ... Computer Science / Security and Cryptology)$2,470$2,420 -
Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Lecture Notes in Computer Science)$2,470$2,420 -
VIP 95折
Measuring and Managing Information Risk: A FAIR Approach$1,950$1,852 -
VIP 95折
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats$2,280$2,166 -
Computer Safety, Reliability, and Security: 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings (Lecture Notes in Computer Science)$2,470$2,420 -
$1,352Cyberwarfare: Information Operations in a Connected World (Information Systems Security & Assurance) -
Corporate Computer Security, 4/e (IE-Paperback)$1,160$1,136 -
Ethical Hacking and Penetration Testing Guide (Paperback)$3,500$3,430 -
Social Engineering in IT Security: Tools, Tactics, and Techniques$1,810$1,773 -
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings (Lecture Notes in Computer Science)$2,470$2,420 -
Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings (Lecture Notes in Computer Science)$2,470$2,420