-
【電子書】奔海:台灣智庫20年
釀出版 出版本書紀錄四十年來台灣的民主進程,也見證了台灣智庫自2001年成立至今,心繫台灣的海內外老中青世代匯流,以腦力激盪政策,以合作針砭時政,以行動守護台灣的故事。 自1980、1990年代社會力迸發
-
奔海──台灣智庫二十年
釀出版 出版本書紀錄四十年來台灣的民主進程,也見證了台灣智庫自2001年成立至今,心繫台灣的海內外老中青世代匯流,以腦力激盪政策,以合作針砭時政,以行動守護台灣的故事。 自1980、1990年代社會力迸發
-
【電子書】南山的部長們:統治現代韓國的暗黑勢力
凌宇 出版朴正熙與KCIA的恩怨情仇 再現政變與暗殺的陰謀現場 ──欲入主青瓦台,必先控制南山! 南山,韓國中央情報部KCIA所在地,也是韓國情報中心的代名詞。 掌握南山的「部長們」手握強權,
-
南山的部長們:統治現代韓國的暗黑勢力
凌宇 出版朴正熙與KCIA的恩怨情仇 再現政變與暗殺的陰謀現場 ──欲入主青瓦台,必先控制南山! 南山,韓國中央情報部KCIA所在地,也是韓國情報中心的代名詞。 掌握南山
-
Side-Channel Analysis of Embedded Systems
Springer 出版It has been more than 20 years since the seminal publications on side-channel attacks. They aim at
-
At Large
Simon & Sc 出版Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this asto
-
【電子書】社會事:權勢者的勝利手冊-台灣地方政治史的50個關鍵字
前衛 出版第一本從50個關鍵字認識台灣地方政治專書! 黨國結構.地方派系.黑金利益 生猛躁動的台灣選舉有效之術 ☆五十篇關鍵字文章,揭露國民黨和地方派系,地方派系與選民之間利益交換的恩庇侍
-
【電子書】阿共打來怎麼辦
大塊 出版◎破解多年來流傳的各種軍事謠言,建立基於事實根據的軍事常識。 ◎處在緊張的美中對峙,美日歐澳印圍中勢態,台灣處在第一線,必須更清楚理解我們所在的實際處境。 ◎培養基礎常識,判斷局勢變化,不被
-
-
社會事—權勢者的勝利手冊:台灣地方政治史的50個關鍵字
有1篇評論前衛 出版第一本從50個關鍵字認識台灣地方政治專書! 黨國結構.地方派系.黑金利益 生猛躁動的台灣選舉有效之術 ☆五十篇關鍵字文章,揭露國民黨和地方派系,地方派系與選民之間利益交換的恩庇侍
-
Networking All-In-One for Dummies
For Dummies 出版Your ultimate one-stop networking reference Designed to replace that groaning shelf-load of dull
-
Mike Meyers’ Comptia Security+ Certification Guide, Third Edition (Exam Sy0-601)
McGraw-Hill 出版An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers In M
-
Facebook for Dummies
For Dummies 出版Be a new face on Facebook! If you're new to the Facebook user community, don't be shy: you're joini
-
-
Media and Law
Ingram 出版In Media and Law: Between Free Speech and Censorship, Mathieu Deflem and Derek M.D Silva have gathe
-
Cloud Reliability Engineering
Ingram 出版Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarante
-
Digital Forensics Explained
Ingram 出版Digital Forensics Explained, 2nd edition, covers the full life cycle of conducting a mobile and com
-
Interactivity and Game Creation
Springer 出版This book constitutes the refereed post-conference proceedings of the 9th International Conference
-
-
-
Using Science in Cybersecurity
Ingram 出版Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough t
-
Guide to Web Development with Java
Springer 出版This comprehensive Guide to Web Development with Java introduces the readers to the three-tiered, M
-
Protective Security
Apress 出版This book shows you how military counter-intelligence principles and objectives are applied. It pro
-
Production Research
Springer 出版This two-volume set presents selected and revised papers from the 10th International Conference of
-
Production Research
Springer 出版This two-volume set presents selected and revised papers from the 10th International Confere
-
Exploring Malicious Hacker Communities
Ingram 出版Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication
-
Deep Learning for Internet of Things Infrastructure
Ingram 出版This book promotes and facilitates exchanges of research knowledge and findings across different di
-
【電子書】被統治的藝術:中華帝國晚期的日常政治
聯經 出版透析從古至今「上有政策,下有對策」的生存智慧 一部與國家打交道的中國日常政治史 ★哈佛大學費正清研究中心主任 宋怡明教授 潛心力作★ ★美國《選擇》2018年度傑出
-
【電子書】被統治的藝術:中華帝國晚期的日常政治
聯經 出版透析從古至今「上有政策,下有對策」的生存智慧 一部與國家打交道的中國日常政治史 ★哈佛大學費正清研究中心主任 宋怡明教授 潛心力作★ ★美國《選擇》2018年度傑出
-
-
Social Media Anxiety and Addiction
Ingram 出版Do you find yourself missing out on those "in the moment" moments? Do you find yourself continually
-
TLS Mastery
Ingram 出版Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your pas
-
TLS Mastery
Ingram 出版Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your pas
-
Monetize Your Blog Step-By-Step
Ingram 出版Would you like to be able to monetize your blog? Would you like to put your blog articles to furthe
-
TLS Mastery
Ingram 出版Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your pas
-
The Doctor's In
Ingram 出版The Doctor's In: Treating America's Greatest Cyber Security ThreatBy: Alan D. WeinbergerMany have c
-
Privacy and Identity Management
Springer 出版This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Inte
-
Technological Innovation for Life Improvement
Springer 出版This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral C
-
Linkedin for Dummies
For Dummies 出版Brand yourself like a pro on LinkedIn LinkedIn multiplies what you know by the power of who you kn
-
Security and Privacy
Springer 出版This book consists of refereed selected papers from the International Conference on Security & Priv
-
Homeland Security and Private Sector Business
Ingram 出版Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protectin
-
Applied Technologies
Springer 出版This volume constitutes the refereed proceedings of the Second International Conference on Applied
-
Stone Age Code
Ingram 出版Acclaim for Stone Age Code: "The book is simply brilliant and genuine, so friendly and stimulating!
-
Strategic Security
Ingram 出版Strategic Security provides security managers, and those aspiring to the position, to think strateg
-
Wireless Network Security
Ingram 出版The book deals with the topic of wireless communication, which has become popular in organizations
-
Culture and International Law
Ingram 出版Papers from the International Conference of the Centre of International Law Studies (CILS 2018). Th
-
Software-Defined Networking and Security
Ingram 出版This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense.
-
Routledge Handbook of South Asian Criminology
Routledge 出版This book covers crime, criminal justice and victimization in Afghanistan, Bangladesh, India, Nepal