資訊安全書展|中文簡體2書75折 英文2書85折 詳見活動內容 »
-
VIP 95折
Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness (Paperback)$2,550$2,422 -
VIP 95折
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility$1,900$1,805 -
85折
$1,785Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide: In-Depth Guidance and Practice -
VIP 95折
Data-Driven Cybersecurity: Reducing Risk with Proven Metrics$2,160$2,052 -
VIP 95折
Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision (Paperback)$1,690$1,605 -
85折
$1,573Microsoft Security Copilot: Master strategies for AI-driven cyber defense -
VIP 90折
Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection (Paperback)$2,565$2,430 -
Privileged Access Management: Strategies for Zero Trust in the Enterprise$1,860$1,822 -
VIP 90折
Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback)$1,995$1,890 -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
電腦安全:原理與實踐(原書第5版)*此書為英文原文書*$774$735 -
CISSP Study Guide 2025-2026: All in One CISSP Exam Prep for the ICS2 Certified Information Systems Security Professional Certification. With Exam Review Material & 774 CISSP Practice Test Questions (Paperback)$1,800$1,764 -
VIP 95折
IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)$2,080$1,976 -
85折
$1,530Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies -
Cryptography (Paperback)$850$833 -
VIP 95折
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption$2,100$1,995 -
VIP 95折
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc (美國原版)$3,300$3,135 -
85折
$3,383A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice -
85折
$1,785Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles (Paperback) -
VIP 95折
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum$1,840$1,748 -
VIP 90折
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp$2,517$2,385 -
85折
$2,678Developing Cybersecurity Programs and Policies in an Ai-Driven World -
VIP 95折
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection (Paperback)$1,990$1,890 -
VIP 95折
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Hardcover) 2/e$2,800$2,660 -
85折
$1,530Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
相關主題
商品描述
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today's technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A compromise has to be struck between security of information and its availability. This book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner. The second edition has been expanded to include the security of cloud-based resources. The remainder of the contents have been reviewed and reordered to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports. "The security of personal information has never been of greater concern to the public. The BCS provides valuable leadership in this area and this is a timely contribution to a vital process" (Richard Thomas, Information Commissioner). (Review of previous edition)
商品描述(中文翻譯)
商業、個人及敏感資訊的安全性非常難以維護,而技術解決方案並不是唯一的答案。在當今以技術為驅動的環境中,對於在辦公室、家中及公共場所的各種設備上資訊傳遞的需求日益增加。必須在資訊的安全性與可用性之間取得平衡。本書提供了在現實且全面的方式下處理資訊保障的重大第一步。第二版已擴展以包括雲端資源的安全性。其餘內容已進行審查並重新排序,以反映本書所支持的資訊安全管理原則的 BCS 認證變更。「個人資訊的安全性從未如此受到公眾的關注。BCS 在這個領域提供了寶貴的領導力,這是對一個重要過程的及時貢獻。」(理查德·托馬斯,資訊專員)(對前一版的評價)
