資訊安全
相關書籍
-
50折
$990Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
-
50折
$990OS X Exploits and Defense
-
50折
$990OSSEC Host-Based Intrusion Detection Guide
-
50折
$825No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
-
VIP 95折
$1,815$1,724 -
VIP 95折
$1,825$1,734 -
80折
$1,400Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
-
50折
$990Microsoft Forefront Security Administration Guide
-
50折
$990Nmap in the Enterprise: Your Guide to Network Scanning
-
VIP 95折
$1,980$1,881 -
18折
$199Knoppix Hacks: Tips and Tools for Hacking, Repairing, and Enjoying Your PC, 2/e (Paperback)
-
23折
$399Gray Hat Hacking, 2/e
-
25折
$399Guide to Tactical Perimeter Defense
-
17折
$399EnCase Computer Forensics--The Official EnCE: EnCase Certified Examiner Study Guide, 2/e
-
50折
$800Web 2.0 Security - Defending AJAX, RIA, AND SOA
-
VIP 95折
$1,800$1,710 -
50折
$900Perl Scripting for Windows Security
-
VIP 95折
$1,650$1,568 -
50折
$750Dr. Tom Shinder's ISA Server 2006 Migration Guide (Paperback)
-
60折
$1,188Open Source Fuzzing Tools (Paperback)
-
50折
$900Penetration Tester's Open Source Toolkit, Volume 2
-
$1,500$1,470 -
50折
$900Network Security Assessment: Know Your Network, 2/e (Paperback)
-
50折
$1,490Information Assurance: Dependability and Security in Networked Systems
-
50折
$990Kismet Hacking
-
50折
$900Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
-
50折
$990InfoSecurity 2008 Threat Analysis
-
24折
$399How to Cheat at Securing Your Network
-
50折
$1,020The Best Damn Cybercrime and Forensics Book Period
-
50折
$990Practical Embedded Security: Building Secure Resource-Constrained Systems