好康優惠
- 原廠商品,享1年車體零件保固
With this book you'll learn the fundamentals of the web environment and how Visual Studio .NET make
Your first step into the world of routing No routing experience required Includes clear and easily
Aims to help you protect your children from dangers that lurk on the Internet. This title enables y
Networking is one of the core tasks of enterprise-level programming, and for the programmer familia
Enter your Web Search Garagewhere you learn how to look, what to useto find magicfind it fasterwith
A guide to penetrating and defending wireless networks, and to hacking wireless networks. It helps
Provides a 'command-line centric' view of Microsoft and non-Microsoft tools that can be very helpfu
Very few organizations today know who their enemy is or how they might attack; when they might atta
Creating a usable e-commerce application is a daunting challenge. There is so much to do, from the
Your first step into the world of computer networking No experience required Includes clear and e
PHP Toolbox explains how to use popular PEAR modules and PHP add-ons to simplify your XML processin
When it comes to network security, many users and administrators are running scared, and justifiabl
This is THE guide to UNIX network programming APIs. Whether you write Web servers, client/server ap
Learn what the Semantic Web is expected to be and how a variety of technologies must play together
Providing descriptions of security techniques, this title presents significant clarification of IEE
According to recent press reports, everyone is developing Web Services but many are still in the ex
With over 100,000 installations, the Snort open-source network intrusion detection system is combin
Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troub
Whether it's petty defacing or full-scale cyber-robbery, hackers are moving to the web along with e
A guide to exactly how web services work, this text reviews each key standard for enabling web serv
Every computer crime leaves tracks--you just have to know where to find them. This book shows you h
On the World Wide Web, speed and efficiency are vital. Users have little patience for slow web page
How to develop cryptosystems that utilize minimal resources to get maximum security.
新手入門!TryHackMe實戰演練,親身體驗攻擊手法與漏洞分析! 隨著網路攻擊事件日益增多,即使不是資安專家,IT工程師也越來越需要了解網路安全。 但資安術語與概念單靠紙上學習難以掌握,最有效
想要成為駭客嗎?你的起點就在這裡! 如果你打算踏上駭客攻擊、資訊安全,與滲透測試這條令人興奮的旅途,這是絕佳的入門書。你將使用Kali Linux這套專為數位鑑識與滲透測試而設計的作業系統來學習L
[資安開源軟體應用] Graylog企業高效應用實戰指南Graylog開源記錄收集與分析系統實戰入門【內容簡介】?基礎入門學習:搭配實際操作畫面快速上手?收取記錄實務:完整介紹多種工具搭配記錄?看板
[資安開源軟體應用] Graylog企業高效應用實戰指南 Graylog開源記錄收集與分析系統實戰入門 【內容簡介】 ♚基礎入門學習:搭配實際操作畫面快速上手 ♚收取記錄實務:完整介紹多種工具搭配記
在雲端原生APP的時代,資安不再是最後一步,而是所有流程的起點。 如果你想打造「安全可見、風險可控」的雲端環境,本書會是你最可靠的技術指南。 本書以CNAPP為核心,帶你從基礎架構、應用程式、部署流
本書將資安推理化為一場關於證據與迷霧、虛擬與現實、信任與操控的敘事探索。在精采的劇情編排中,讀者不僅能夠身歷其境地跟隨角色一同追查真相,同時也學習並理解當今最新的資安防禦知識與技術——從數位鑑識、監
本書將資安推理化為一場關於證據與迷霧、虛擬與現實、信任與操控的敘事探索。在精采的劇情編排中,讀者不僅能夠身歷其境地跟隨角色一同追查真相,同時也學習並理解當今最新的資安防禦知識與技術——從數位鑑識、監
全台第一本反守為攻的資安教戰守則!應讀者熱烈反應,第三版火熱上市!新增章節教你探索系統核心!囊括了近年第一線各國之國家級網軍曾使用過的奇技淫巧,從扎實的基礎逐步剖析攻擊原理與復現惡意利用。★內容由淺
全台第一本反守為攻的資安教戰守則!應讀者熱烈反應,第三版火熱上市!新增章節教你探索系統核心!囊括了近年第一線各國之國家級網軍曾使用過的奇技淫巧,從扎實的基礎逐步剖析攻擊原理與復現惡意利用。★內容由淺