2015年关注的技术书籍

http://www.springer.com/computer/security+and+cryptology?SGWID=8-40160-66-653429-0&sba=INCLUDE&originalID=109089&sortOrder=sortCopyrightYeardesc&searchType=SEMIAUTOMATIC_BOOK_LIST&resultStart=21&searchScope=editions


1. 八月出版的Advanced Malware Analysis(卧槽)

http://www.amazon.com/Advanced-Malware-Analysis-Christopher-Elisan/dp/0071819746/ref=sr_1_45?s=books&ie=UTF8&qid=1424064882&sr=1-45


2.Network Attacks and Exploitation: A Framework

http://www.amazon.com/Network-Attacks-Exploitation-Matthew-Monte/dp/1118987128/ref=sr_1_65?s=books&ie=UTF8&qid=1424065008&sr=1-65


3.Network Security Assessment: Know Your Network

http://www.amazon.com/Network-Security-Assessment-Know-Your/dp/149191095X/ref=sr_1_72?s=books&ie=UTF8&qid=1424065008&sr=1-72


4.Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

http://www.amazon.com/Crafting-InfoSec-Playbook-Security-Monitoring/dp/1491949406/ref=sr_1_75?s=books&ie=UTF8&qid=1424065076&sr=1-75


5.Application Threat Modeling

http://www.amazon.com/Application-Threat-Modeling-Marco-Morana/dp/0470500964/ref=sr_1_84?s=books&ie=UTF8&qid=1424065076&sr=1-84


6.Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security(cisco终于出了本大数据安全的书籍)

http://www.amazon.com/Network-Security-NetFlow-IPFIX-Information/dp/1587144387/ref=sr_1_85?s=books&ie=UTF8&qid=1424065131&sr=1-85


7.Enterprise Cybersecurity: How to Implement a Successful Cyber Defense Program Against Advanced Threats

http://www.amazon.com/Enterprise-Cybersecurity-Implement-Successful-Organization/dp/1430260823/ref=sr_1_89?s=books&ie=UTF8&qid=1424065131&sr=1-89


8.Network Security and Communication Engineering

http://www.amazon.com/Network-Security-and-Communication-Engineering/dp/1138028215/ref=sr_1_96?s=books&ie=UTF8&qid=1424065131&sr=1-96


9.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_99?s=books&ie=UTF8&qid=1424065222&sr=1-99


10.Aspect-Oriented Security Hardening of UML Design Models

http://www.amazon.com/Aspect-Oriented-Security-Hardening-Design-Models/dp/3319161059/ref=sr_1_108?s=books&ie=UTF8&qid=1424065222&sr=1-108


11.Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

http://www.amazon.com/Cyber-Security-Protecting-Critical-Infrastructures-Warfare/dp/1482239221/ref=sr_1_121?s=books&ie=UTF8&qid=1424065324&sr=1-121


12.Securing SQL Server, Third Edition: Protecting Your Database from Attackers

http://www.amazon.com/Securing-SQL-Server-Third-Protecting/dp/0128012757/ref=sr_1_127?s=books&ie=UTF8&qid=1424065324&sr=1-127


13.Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

http://www.amazon.com/Phishing-Dark-Waters-Offensive-Defensive/dp/1118958470/ref=sr_1_139?s=books&ie=UTF8&qid=1424065373&sr=1-139


14.Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies

http://www.amazon.com/Application-Data-National-Security-Practitioners/dp/0128019670/ref=sr_1_154?s=books&ie=UTF8&qid=1424065403&sr=1-154


15.Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

http://www.amazon.com/Hacking-Exposed-Malware-amp-Rootkits/dp/0071823077/ref=sr_1_160?s=books&ie=UTF8&qid=1424065455&sr=1-160


16.Software Trace and Log Analysis: A Pattern Reference

http://www.amazon.com/Software-Trace-Log-Analysis-Reference/dp/1908043806/ref=sr_1_220?s=books&ie=UTF8&qid=1424065553&sr=1-220


17.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

http://www.amazon.com/Practical-Guide-TPM-2-0-Platform-ebook/dp/B00MBL1CWG/ref=sr_1_253?s=books&ie=UTF8&qid=1424065659&sr=1-253


18.Guide to Computer Forensics and Investigation

http://www.amazon.com/Guide-Computer-Forensics-Investigations-Nelson-ebook/dp/B00H7HVAQ2/ref=sr_1_270?s=books&ie=UTF8&qid=1424065739&sr=1-270


19.Cyber Defense and Situational Awareness

http://www.springer.com/computer/security+and+cryptology/book/978-3-319-11390-6


20.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_3?s=books&ie=UTF8&qid=1424920961&sr=1-3&keywords=investigation

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值