
¥2,561Supremacy: Winner of the Financial Times Business Book of the Year Award (English Edition)

¥8,078Penetration Testing: A Hands-On Introduction to Hacking

¥10,112The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles

¥4,576Hacking Active Directory: Attacking Enterprise Networks (Red Teaming: The Ultimate Zero to Hero Guide)

¥27,616Reasonable Expectations of Privacy: With Special Regard to European Privacy and Data Protection Law (Law, Governance and Technology Series, 72)

¥2,836Differential Privacy (The MIT Press Essential Knowledge series)

¥11,174Real-World Cryptography

¥5,391The Digital Fourth Amendment: Privacy and Policing in Our Online World (English Edition)

¥12,052Hands-On Differential Privacy: Introduction to the Theory and Practice Using OpenDP

¥10,974Differential Privacy: From Theory to Practice (Synthesis Lectures on Information Security, Privacy, and Trust)

¥11,239Spring Start Here: Learn what you need and learn it well

¥1,635Cloud Computing with AWS: A Hands-On Approach: A Hands-On Guide to Building in the Cloud

¥1,760The Attention Merchants: The Epic Struggle to Get Inside Our Heads (English Edition)

¥3,320How to Not Suck at Cybersecurity: Real Advice, for Real People, From Individuals to Enterprise Execs

¥7,773Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

¥2,559This Is How They Tell Me the World Ends: A True Story

¥8,513From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research

¥5,731Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition (English Edition)

¥8,104MAoS - Malware Analysis on Steroids: Fighting Malware to the Death - Real-World Threats and Reverse Engineering Tactics

¥8,775IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)

¥4,424OSINT for Deep & Dark Web: Techniques for Cybercrime Investigations (The OSINT Analyst Series: Intelligence Techniques for the Digital Age)

¥8,895Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

¥0Dark Web Intelligence and OSINT Techniques

¥4,714Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

¥3,055Careless People: A story of where I used to work

¥5,963Social Engineering: The Science of Human Hacking (English Edition)

¥7,537The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

¥9,817Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities

¥1,250CCNA 200-301 Official Cert Guide with 1200+ Updated Questions and Explanations: The 2025 Updated Version (English Edition)

¥13,291The Art and Science of Digital Compositing, Second Edition: Techniques for Visual Effects, Animation and Motion Graphics (The Morgan Kaufmann Series in Computer Graphics)
Current Active Category ID: 2634799051