2015年关注的技术书籍

简介: http://www.springer.com/computer/security+and+cryptology?SGWID=8-40160-66-653429-0&sba=INCLUDE...

http://www.springer.com/computer/security+and+cryptology?SGWID=8-40160-66-653429-0&sba=INCLUDE&originalID=109089&sortOrder=sortCopyrightYeardesc&searchType=SEMIAUTOMATIC_BOOK_LIST&resultStart=21&searchScope=editions


1. 八月出版的Advanced Malware Analysis(卧槽)

http://www.amazon.com/Advanced-Malware-Analysis-Christopher-Elisan/dp/0071819746/ref=sr_1_45?s=books&ie=UTF8&qid=1424064882&sr=1-45


2.Network Attacks and Exploitation: A Framework

http://www.amazon.com/Network-Attacks-Exploitation-Matthew-Monte/dp/1118987128/ref=sr_1_65?s=books&ie=UTF8&qid=1424065008&sr=1-65


3.Network Security Assessment: Know Your Network

http://www.amazon.com/Network-Security-Assessment-Know-Your/dp/149191095X/ref=sr_1_72?s=books&ie=UTF8&qid=1424065008&sr=1-72


4.Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

http://www.amazon.com/Crafting-InfoSec-Playbook-Security-Monitoring/dp/1491949406/ref=sr_1_75?s=books&ie=UTF8&qid=1424065076&sr=1-75


5.Application Threat Modeling

http://www.amazon.com/Application-Threat-Modeling-Marco-Morana/dp/0470500964/ref=sr_1_84?s=books&ie=UTF8&qid=1424065076&sr=1-84


6.Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security(cisco终于出了本大数据安全的书籍)

http://www.amazon.com/Network-Security-NetFlow-IPFIX-Information/dp/1587144387/ref=sr_1_85?s=books&ie=UTF8&qid=1424065131&sr=1-85


7.Enterprise Cybersecurity: How to Implement a Successful Cyber Defense Program Against Advanced Threats

http://www.amazon.com/Enterprise-Cybersecurity-Implement-Successful-Organization/dp/1430260823/ref=sr_1_89?s=books&ie=UTF8&qid=1424065131&sr=1-89


8.Network Security and Communication Engineering

http://www.amazon.com/Network-Security-and-Communication-Engineering/dp/1138028215/ref=sr_1_96?s=books&ie=UTF8&qid=1424065131&sr=1-96


9.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_99?s=books&ie=UTF8&qid=1424065222&sr=1-99


10.Aspect-Oriented Security Hardening of UML Design Models

http://www.amazon.com/Aspect-Oriented-Security-Hardening-Design-Models/dp/3319161059/ref=sr_1_108?s=books&ie=UTF8&qid=1424065222&sr=1-108


11.Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

http://www.amazon.com/Cyber-Security-Protecting-Critical-Infrastructures-Warfare/dp/1482239221/ref=sr_1_121?s=books&ie=UTF8&qid=1424065324&sr=1-121


12.Securing SQL Server, Third Edition: Protecting Your Database from Attackers

http://www.amazon.com/Securing-SQL-Server-Third-Protecting/dp/0128012757/ref=sr_1_127?s=books&ie=UTF8&qid=1424065324&sr=1-127


13.Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

http://www.amazon.com/Phishing-Dark-Waters-Offensive-Defensive/dp/1118958470/ref=sr_1_139?s=books&ie=UTF8&qid=1424065373&sr=1-139


14.Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies

http://www.amazon.com/Application-Data-National-Security-Practitioners/dp/0128019670/ref=sr_1_154?s=books&ie=UTF8&qid=1424065403&sr=1-154


15.Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

http://www.amazon.com/Hacking-Exposed-Malware-amp-Rootkits/dp/0071823077/ref=sr_1_160?s=books&ie=UTF8&qid=1424065455&sr=1-160


16.Software Trace and Log Analysis: A Pattern Reference

http://www.amazon.com/Software-Trace-Log-Analysis-Reference/dp/1908043806/ref=sr_1_220?s=books&ie=UTF8&qid=1424065553&sr=1-220


17.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

http://www.amazon.com/Practical-Guide-TPM-2-0-Platform-ebook/dp/B00MBL1CWG/ref=sr_1_253?s=books&ie=UTF8&qid=1424065659&sr=1-253


18.Guide to Computer Forensics and Investigation

http://www.amazon.com/Guide-Computer-Forensics-Investigations-Nelson-ebook/dp/B00H7HVAQ2/ref=sr_1_270?s=books&ie=UTF8&qid=1424065739&sr=1-270


19.Cyber Defense and Situational Awareness

http://www.springer.com/computer/security+and+cryptology/book/978-3-319-11390-6


20.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_3?s=books&ie=UTF8&qid=1424920961&sr=1-3&keywords=investigation

目录
相关文章
|
6月前
|
监控 架构师 安全
速读《技术人修炼之道》-看到最后定有收获
最近一段时间读完了《技术人修炼之道》,书中内容涵盖了作者多年实践和思想的结晶,整体读来有许多观点深有同感,也学习到了一些新的理念,在这里感谢黄哲铿老师。本文主要结合我自身十几年的IT行业经验,以及创业多年的感受,从书中提炼了一些个人觉得非常有价值并且好落地的点进行分享。
|
8月前
|
测试技术 开发者
好书推荐《游戏测试精通》
好书推荐《游戏测试精通》
良心之作送你几个Xsheel使用小技巧(1)
良心之作送你几个Xsheel使用小技巧
98 0
良心之作送你几个Xsheel使用小技巧(1)
|
程序员
良心之作送你几个Xsheel使用小技巧(2)
良心之作送你几个Xsheel使用小技巧
80 0
良心之作送你几个Xsheel使用小技巧(2)
|
JSON 前端开发 JavaScript
别人变强靠天赋,而我,靠思维导图
说了你可能不信,我经常怀疑自己 不!适!合!写!代!码! 写代码的时候,我经常脑壳一晕,或去群里摸一下鱼,然后就突然搞不清上一段代码是写来干嘛的!! 而且会有一点恍惚,刚才那段代码,真的是我写的?
107 0
别人变强靠天赋,而我,靠思维导图
|
数据挖掘
|
设计模式 IDE Java
奉劝那些想把编程学好的学弟学妹们!呕心沥血,袒露心声,掏心掏肺
奉劝那些想把编程学好的学弟学妹们!呕心沥血,袒露心声,掏心掏肺
119 0
|
算法 Java Android开发
黄小斜:我的成长史,关于考研,求职与写作的那些事
阅读本文大概需要 9.96 分钟。 今天和大家分享一下我的故事,相信老读者都比较了解,恰逢今天是公众号首次发文一周年的纪念日,借此机会,重新向大家介绍一下我的经历。 1. 从小到大,我的成绩都只能算中等。
|
人工智能 算法 JavaScript
零基础学计算机图形学太难?或许你缺的只是一本好书
对先修知识没有特别多的要求,代码和文本都很详细
760 0