NANDEMOJAPAN
thumbnail
¥18,723Probabilistic Machine Learning: An Introduction (Adaptive Computation and Machine Learning series)
thumbnail
¥6,261Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
thumbnail
¥2,552The Wires of War: Technology and the Global Struggle for Power (English Edition)
thumbnail
¥2,561Supremacy: Winner of the Financial Times Business Book of the Year Award (English Edition)
thumbnail
¥4,922Careless People: A Cautionary Tale of Power, Greed, and Lost Idealism
thumbnail
¥1,782This Book Is Overdue!: How Librarians and Cybrarians Can Save Us All (English Edition)
thumbnail
¥8,074Penetration Testing: A Hands-On Introduction to Hacking
thumbnail
¥10,112The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles
thumbnail
¥4,576Hacking Active Directory: Attacking Enterprise Networks (Red Teaming: The Ultimate Zero to Hero Guide)
thumbnail
¥27,616Reasonable Expectations of Privacy: With Special Regard to European Privacy and Data Protection Law (Law, Governance and Technology Series, 72)
thumbnail
¥3,071Differential Privacy (The MIT Press Essential Knowledge series)
thumbnail
¥10,699Real-World Cryptography
thumbnail
¥5,391The Digital Fourth Amendment: Privacy and Policing in Our Online World (English Edition)
thumbnail
¥12,417Hands-On Differential Privacy: Introduction to the Theory and Practice Using OpenDP
thumbnail
¥10,962Differential Privacy: From Theory to Practice (Synthesis Lectures on Information Security, Privacy, and Trust)
thumbnail
¥11,239Spring Start Here: Learn what you need and learn it well
thumbnail
¥1,635Cloud Computing with AWS: A Hands-On Approach: A Hands-On Guide to Building in the Cloud
thumbnail
¥1,760The Attention Merchants: The Epic Struggle to Get Inside Our Heads (English Edition)
thumbnail
¥3,320How to Not Suck at Cybersecurity: Real Advice, for Real People, From Individuals to Enterprise Execs
thumbnail
¥7,773Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
thumbnail
¥2,572This Is How They Tell Me the World Ends: A True Story
thumbnail
¥3,055Careless People: A story of where I used to work
thumbnail
¥8,829From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
thumbnail
¥5,731Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition (English Edition)
thumbnail
¥8,104MAoS - Malware Analysis on Steroids: Fighting Malware to the Death - Real-World Threats and Reverse Engineering Tactics
thumbnail
¥8,787IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)
thumbnail
¥4,424OSINT for Deep & Dark Web: Techniques for Cybercrime Investigations (The OSINT Analyst Series: Intelligence Techniques for the Digital Age)
thumbnail
¥8,895Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
thumbnail
¥0Dark Web Intelligence and OSINT Techniques
thumbnail
¥4,857Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

Current Active Category ID: 2634799051