資訊安全 / Penetration-test
相關書籍
-
預購95折
Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve$3,700$3,515 -
預購95折
Autonomous Cyber Resilience$4,160$3,952 -
預購95折
Cyber Security for Space Missions: Mitigating Risks in the New Space Era$3,700$3,515 -
預購95折
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence$5,330$5,063 -
Blue Team Handbook: Incident Response$2,310$2,263 -
The Book of Pf, 4th Edition: A No-Nonsense Guide to the OpenBSD Firewall$2,130$2,087 -
VIP 95折
Unveiling the Art of Steganography: A Modern Approach$5,330$5,063 -
VIP 95折
Unveiling the Art of Steganography: A Modern Approach$2,540$2,413 -
VIP 95折
Learning Ransomware Response & Recovery: Stopping Ransomware One Restore at a Time$2,130$2,023 -
$456新型網絡環境下數據安全關鍵技術研究 -
VIP 95折
Agentic AI for Offensive Cybersecurity: Build and automate smarter penetration testing workflows using AI-driven agents$1,710$1,624 -
Digital Forensics, Investigation, and Response$4,610$4,517 -
VIP 95折
Red Team Evaluation Framework: Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team$2,540$2,413 -
VIP 95折
Red Team Evaluation Framework: Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team$5,330$5,063 -
$654萬徑尋蹤:Windows入侵檢測與防禦編程(卷二) -
VIP 95折
Incident Management for Industrial Control Systems: Safeguard industrial control systems by mastering critical infrastructure cybersecurity$1,710$1,624 -
VIP 95折
Security Intelligence with Sumo Logic: Your guide to an effective security detection and response program with the Sumo Logic platform$1,710$1,624 -
Starting Guide for Postfix Mail Server Configuration Supporting Anti-Spam and Anti-Virus$780$764 -
VIP 95折
Forensic Investigation of Smart Digital Devices: A Hands-on Guide$5,330$5,063 -
VIP 95折
Forensic Investigation of Smart Digital Devices: A Hands-on Guide$2,540$2,413 -
Cyberethics: Morality and Law in Cyberspace$4,220$4,135 -
Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response$1,530$1,499 -
VIP 95折
Cybersecurity for Network and Information Security: Principles, Techniques and Applications$3,190$3,030 -
VIP 95折
Building a Secure Infrastructure: The Key Procedures for System Network Security$3,190$3,030 -
VIP 95折
Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II$4,760$4,522 -
VIP 95折
ICT Analysis and Applications: Proceedings of Ict4sd 2025, Volume 11$11,380$10,811 -
VIP 95折
Developments and Advances in Defense and Security: Proceedings of Micrads 2025$13,350$12,682 -
VIP 95折
Proceedings of the International Conference on Artificial Intelligence, Security, and Networking (Caisn 2024): Innovative Approaches in Ai, Security,$10,190$9,680 -
VIP 95折
Proceedings of the Nielit's International Conference on Communication, Electronics and Digital Technologies: Nicedt 2025, Volume 1$11,380$10,811 -
VIP 95折
Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II$3,580$3,401