NANDEMOJAPAN
thumbnail
¥2,561Supremacy: Winner of the Financial Times Business Book of the Year Award (English Edition)
thumbnail
¥8,078Penetration Testing: A Hands-On Introduction to Hacking
thumbnail
¥10,112The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles
thumbnail
¥4,576Hacking Active Directory: Attacking Enterprise Networks (Red Teaming: The Ultimate Zero to Hero Guide)
thumbnail
¥27,616Reasonable Expectations of Privacy: With Special Regard to European Privacy and Data Protection Law (Law, Governance and Technology Series, 72)
thumbnail
¥2,836Differential Privacy (The MIT Press Essential Knowledge series)
thumbnail
¥11,174Real-World Cryptography
thumbnail
¥5,391The Digital Fourth Amendment: Privacy and Policing in Our Online World (English Edition)
thumbnail
¥12,052Hands-On Differential Privacy: Introduction to the Theory and Practice Using OpenDP
thumbnail
¥10,974Differential Privacy: From Theory to Practice (Synthesis Lectures on Information Security, Privacy, and Trust)
thumbnail
¥11,239Spring Start Here: Learn what you need and learn it well
thumbnail
¥1,635Cloud Computing with AWS: A Hands-On Approach: A Hands-On Guide to Building in the Cloud
thumbnail
¥1,760The Attention Merchants: The Epic Struggle to Get Inside Our Heads (English Edition)
thumbnail
¥3,320How to Not Suck at Cybersecurity: Real Advice, for Real People, From Individuals to Enterprise Execs
thumbnail
¥7,773Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
thumbnail
¥2,559This Is How They Tell Me the World Ends: A True Story
thumbnail
¥8,513From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
thumbnail
¥5,731Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition (English Edition)
thumbnail
¥8,104MAoS - Malware Analysis on Steroids: Fighting Malware to the Death - Real-World Threats and Reverse Engineering Tactics
thumbnail
¥8,775IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)
thumbnail
¥4,424OSINT for Deep & Dark Web: Techniques for Cybercrime Investigations (The OSINT Analyst Series: Intelligence Techniques for the Digital Age)
thumbnail
¥8,895Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
thumbnail
¥0Dark Web Intelligence and OSINT Techniques
thumbnail
¥4,714Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
thumbnail
¥3,055Careless People: A story of where I used to work
thumbnail
¥5,963Social Engineering: The Science of Human Hacking (English Edition)
thumbnail
¥7,537The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
thumbnail
¥9,817Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
thumbnail
¥1,250CCNA 200-301 Official Cert Guide with 1200+ Updated Questions and Explanations: The 2025 Updated Version (English Edition)
thumbnail
¥13,291The Art and Science of Digital Compositing, Second Edition: Techniques for Visual Effects, Animation and Motion Graphics (The Morgan Kaufmann Series in Computer Graphics)

Current Active Category ID: 2634799051