資訊安全
相關書籍
-
50折
$990GFI Network Security and PCI Compliance Power Tools
-
50折
$1,050Voice over IP Security
-
50折
$1,400Building a Digital Forensic Laboratory
-
60折
$1,155Hacking Exposed Linux, 3/e (Paperback)
-
80折
$1,960Wireless Security: Know It All
-
18折
$399CISSP: Certified Information Systems Security Professional Study Guide, 4/e
-
50折
$1,250SAP Security Configuration and Deployment: IT Administrator's Guide to Best Practices
-
50折
$1,150Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure (Paperback)
-
80折
$1,584Applied Security Visualization (Paperback)
-
50折
$990Securing Citrix XenApp Server in the Enterprise (Paperback)
-
80折
$1,968Malware Forensics: Investigating and Analyzing Malicious Code
-
50折
$990Scene of the Cybercrime, 2/e
-
50折
$1,190The IT Regulatory and Standards Compliance Handbook:: How to Survive Information Systems Audit and Assessments
-
50折
$800Group Policy Fundamentals, Security, and Troubleshooting (Paperback)
-
24折
$399Implementing Email and Security Tokens: Current Standards, Tools, and Practices (Hardcover)
-
80折
$2,048Network Security: Know It All
-
20折
$399Sonicwall Secure Wireless Network Integrated Solutions Guide
-
24折
$299Foundations of Mac OS X Leopard Security
-
23折
$399Guide to Strategic Infrastructure Security
-
80折
$1,840Windows Server 2008 PKI and Certificate Security (Paperback)
-
50折
$613The New School of Information Security (Paperback)
-
50折
$1,073Implementing 802.1X Security Solutions for Wired and Wireless Networks
-
50折
$945CISA: Certified Information Systems Auditor Study Guide, 2/e
-
50折
$990Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
-
50折
$990OS X Exploits and Defense
-
50折
$990OSSEC Host-Based Intrusion Detection Guide
-
50折
$825No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
-
80折
$1,400Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
-
50折
$990Microsoft Forefront Security Administration Guide
-
50折
$990Nmap in the Enterprise: Your Guide to Network Scanning