博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
2015年关注的技术书籍
阅读量:2434 次
发布时间:2019-05-10

本文共 4301 字,大约阅读时间需要 14 分钟。

http://www.springer.com/computer/security+and+cryptology?SGWID=8-40160-66-653429-0&sba=INCLUDE&originalID=109089&sortOrder=sortCopyrightYeardesc&searchType=SEMIAUTOMATIC_BOOK_LIST&resultStart=21&searchScope=editions

1. 八月出版的Advanced Malware Analysis(卧槽)

http://www.amazon.com/Advanced-Malware-Analysis-Christopher-Elisan/dp/0071819746/ref=sr_1_45?s=books&ie=UTF8&qid=1424064882&sr=1-45

2.Network Attacks and Exploitation: A Framework

http://www.amazon.com/Network-Attacks-Exploitation-Matthew-Monte/dp/1118987128/ref=sr_1_65?s=books&ie=UTF8&qid=1424065008&sr=1-65

3.Network Security Assessment: Know Your Network

http://www.amazon.com/Network-Security-Assessment-Know-Your/dp/149191095X/ref=sr_1_72?s=books&ie=UTF8&qid=1424065008&sr=1-72

4.Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

http://www.amazon.com/Crafting-InfoSec-Playbook-Security-Monitoring/dp/1491949406/ref=sr_1_75?s=books&ie=UTF8&qid=1424065076&sr=1-75

5.Application Threat Modeling

http://www.amazon.com/Application-Threat-Modeling-Marco-Morana/dp/0470500964/ref=sr_1_84?s=books&ie=UTF8&qid=1424065076&sr=1-84

6.Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security(cisco终于出了本大数据安全的书籍)

http://www.amazon.com/Network-Security-NetFlow-IPFIX-Information/dp/1587144387/ref=sr_1_85?s=books&ie=UTF8&qid=1424065131&sr=1-85

7.Enterprise Cybersecurity: How to Implement a Successful Cyber Defense Program Against Advanced Threats

http://www.amazon.com/Enterprise-Cybersecurity-Implement-Successful-Organization/dp/1430260823/ref=sr_1_89?s=books&ie=UTF8&qid=1424065131&sr=1-89

8.Network Security and Communication Engineering

http://www.amazon.com/Network-Security-and-Communication-Engineering/dp/1138028215/ref=sr_1_96?s=books&ie=UTF8&qid=1424065131&sr=1-96

9.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_99?s=books&ie=UTF8&qid=1424065222&sr=1-99

10.Aspect-Oriented Security Hardening of UML Design Models

http://www.amazon.com/Aspect-Oriented-Security-Hardening-Design-Models/dp/3319161059/ref=sr_1_108?s=books&ie=UTF8&qid=1424065222&sr=1-108

11.Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

http://www.amazon.com/Cyber-Security-Protecting-Critical-Infrastructures-Warfare/dp/1482239221/ref=sr_1_121?s=books&ie=UTF8&qid=1424065324&sr=1-121

12.Securing SQL Server, Third Edition: Protecting Your Database from Attackers

http://www.amazon.com/Securing-SQL-Server-Third-Protecting/dp/0128012757/ref=sr_1_127?s=books&ie=UTF8&qid=1424065324&sr=1-127

13.Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

http://www.amazon.com/Phishing-Dark-Waters-Offensive-Defensive/dp/1118958470/ref=sr_1_139?s=books&ie=UTF8&qid=1424065373&sr=1-139

14.Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies

http://www.amazon.com/Application-Data-National-Security-Practitioners/dp/0128019670/ref=sr_1_154?s=books&ie=UTF8&qid=1424065403&sr=1-154

15.Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

http://www.amazon.com/Hacking-Exposed-Malware-amp-Rootkits/dp/0071823077/ref=sr_1_160?s=books&ie=UTF8&qid=1424065455&sr=1-160

16.Software Trace and Log Analysis: A Pattern Reference

http://www.amazon.com/Software-Trace-Log-Analysis-Reference/dp/1908043806/ref=sr_1_220?s=books&ie=UTF8&qid=1424065553&sr=1-220

17.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

http://www.amazon.com/Practical-Guide-TPM-2-0-Platform-ebook/dp/B00MBL1CWG/ref=sr_1_253?s=books&ie=UTF8&qid=1424065659&sr=1-253

18.Guide to Computer Forensics and Investigation

http://www.amazon.com/Guide-Computer-Forensics-Investigations-Nelson-ebook/dp/B00H7HVAQ2/ref=sr_1_270?s=books&ie=UTF8&qid=1424065739&sr=1-270

19.Cyber Defense and Situational Awareness

http://www.springer.com/computer/security+and+cryptology/book/978-3-319-11390-6

20.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_3?s=books&ie=UTF8&qid=1424920961&sr=1-3&keywords=investigation

转载地址:http://slmmb.baihongyu.com/

你可能感兴趣的文章
CMMI模型与Rational软件相结合
查看>>
集成 IBM Rational RequisitePro 与 IBM Rational Portfolio Manager
查看>>
OOAD利器Rational Rose的介绍
查看>>
SCA客户端以及基于Java的模型实现(一)
查看>>
后CMMI时代的软件过程改进
查看>>
SCA及未来软件系统的开发
查看>>
CaliberRM 需求管理系统
查看>>
需求管理工具试用 – CaliberRM
查看>>
一年的测试生活和感悟
查看>>
黑盒测试
查看>>
没有需求就没有软件——需求工程简论
查看>>
使用PHP开发SCA和SDO
查看>>
通过RUP用例进行需求管理的可追踪性策略(2)
查看>>
持续改进之配置管理变更的关键路径
查看>>
SCA客户端以及基于Java的模型实现(四)
查看>>
ora2pg 字符集 转换问题总结
查看>>
postgresql 优化与维护
查看>>
mongodb replica sets 测试
查看>>
linux AS6.2 与 as5.4 的对比,性能提升明显
查看>>
FLASHCACHE 的是是非非
查看>>