天天看點

2015年關注的技術書籍

http://www.springer.com/computer/security+and+cryptology?SGWID=8-40160-66-653429-0&sba=INCLUDE&originalID=109089&sortOrder=sortCopyrightYeardesc&searchType=SEMIAUTOMATIC_BOOK_LIST&resultStart=21&searchScope=editions

1. 八月出版的Advanced Malware Analysis(卧槽)

http://www.amazon.com/Advanced-Malware-Analysis-Christopher-Elisan/dp/0071819746/ref=sr_1_45?s=books&ie=UTF8&qid=1424064882&sr=1-45

2.Network Attacks and Exploitation: A Framework

http://www.amazon.com/Network-Attacks-Exploitation-Matthew-Monte/dp/1118987128/ref=sr_1_65?s=books&ie=UTF8&qid=1424065008&sr=1-65

3.Network Security Assessment: Know Your Network

http://www.amazon.com/Network-Security-Assessment-Know-Your/dp/149191095X/ref=sr_1_72?s=books&ie=UTF8&qid=1424065008&sr=1-72

4.Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

http://www.amazon.com/Crafting-InfoSec-Playbook-Security-Monitoring/dp/1491949406/ref=sr_1_75?s=books&ie=UTF8&qid=1424065076&sr=1-75

5.Application Threat Modeling

http://www.amazon.com/Application-Threat-Modeling-Marco-Morana/dp/0470500964/ref=sr_1_84?s=books&ie=UTF8&qid=1424065076&sr=1-84

6.Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security(cisco終于出了本大資料安全的書籍)

http://www.amazon.com/Network-Security-NetFlow-IPFIX-Information/dp/1587144387/ref=sr_1_85?s=books&ie=UTF8&qid=1424065131&sr=1-85

7.Enterprise Cybersecurity: How to Implement a Successful Cyber Defense Program Against Advanced Threats

http://www.amazon.com/Enterprise-Cybersecurity-Implement-Successful-Organization/dp/1430260823/ref=sr_1_89?s=books&ie=UTF8&qid=1424065131&sr=1-89

8.Network Security and Communication Engineering

http://www.amazon.com/Network-Security-and-Communication-Engineering/dp/1138028215/ref=sr_1_96?s=books&ie=UTF8&qid=1424065131&sr=1-96

9.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_99?s=books&ie=UTF8&qid=1424065222&sr=1-99

10.Aspect-Oriented Security Hardening of UML Design Models

http://www.amazon.com/Aspect-Oriented-Security-Hardening-Design-Models/dp/3319161059/ref=sr_1_108?s=books&ie=UTF8&qid=1424065222&sr=1-108

11.Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

http://www.amazon.com/Cyber-Security-Protecting-Critical-Infrastructures-Warfare/dp/1482239221/ref=sr_1_121?s=books&ie=UTF8&qid=1424065324&sr=1-121

12.Securing SQL Server, Third Edition: Protecting Your Database from Attackers

http://www.amazon.com/Securing-SQL-Server-Third-Protecting/dp/0128012757/ref=sr_1_127?s=books&ie=UTF8&qid=1424065324&sr=1-127

13.Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

http://www.amazon.com/Phishing-Dark-Waters-Offensive-Defensive/dp/1118958470/ref=sr_1_139?s=books&ie=UTF8&qid=1424065373&sr=1-139

14.Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies

http://www.amazon.com/Application-Data-National-Security-Practitioners/dp/0128019670/ref=sr_1_154?s=books&ie=UTF8&qid=1424065403&sr=1-154

15.Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

http://www.amazon.com/Hacking-Exposed-Malware-amp-Rootkits/dp/0071823077/ref=sr_1_160?s=books&ie=UTF8&qid=1424065455&sr=1-160

16.Software Trace and Log Analysis: A Pattern Reference

http://www.amazon.com/Software-Trace-Log-Analysis-Reference/dp/1908043806/ref=sr_1_220?s=books&ie=UTF8&qid=1424065553&sr=1-220

17.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

http://www.amazon.com/Practical-Guide-TPM-2-0-Platform-ebook/dp/B00MBL1CWG/ref=sr_1_253?s=books&ie=UTF8&qid=1424065659&sr=1-253

18.Guide to Computer Forensics and Investigation

http://www.amazon.com/Guide-Computer-Forensics-Investigations-Nelson-ebook/dp/B00H7HVAQ2/ref=sr_1_270?s=books&ie=UTF8&qid=1424065739&sr=1-270

19.Cyber Defense and Situational Awareness

http://www.springer.com/computer/security+and+cryptology/book/978-3-319-11390-6

20.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

http://www.amazon.com/Hacking-Web-Intelligence-Reconnaissance-Techniques/dp/0128018674/ref=sr_1_3?s=books&ie=UTF8&qid=1424920961&sr=1-3&keywords=investigation

繼續閱讀