不错的安全书籍

简介: http://www.amazon.cn/Advanced-Persistent-Threat-Hacking-The-Art-and-Science-of-Hacking-Any-Org...

http://www.amazon.cn/Advanced-Persistent-Threat-Hacking-The-Art-and-Science-of-Hacking-Any-Organization-Wrightson-Tyler/dp/0071828362/ref=sr_1_2?ie=UTF8&qid=1410155072&sr=8-2&keywords=Advanced+Persistent+Threat


http://www.amazon.com/s/ref=nb_sb_noss_1?url=node%3D377560011&field-keywords=big+data+security&rh=n%3A283155%2Cn%3A!1000%2Cn%3A5%2Cn%3A377560011%2Ck%3Abig+data+security


1、 Automated Firewall Analytics: Design, Configuration and Optimization

http://www.amazon.com/Automated-Firewall-Analytics-Configuration-Optimization/dp/3319103709/ref=sr_1_96?s=books&ie=UTF8&qid=1409992955&sr=1-96


2、Designing and Building Security Operations Center

http://www.amazon.com/Automated-Firewall-Analytics-Configuration-Optimization/dp/3319103709/ref=sr_1_96?s=books&ie=UTF8&qid=1409992955&sr=1-96


3、The Chief Information Security Officer: Roles and Responsibilities

http://www.amazon.com/Chief-Information-Security-Officer-Responsibilities/dp/1466517891/ref=sr_1_121?s=books&ie=UTF8&qid=1409993132&sr=1-121


4、CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security

http://www.amazon.com/CSA-Guide-Cloud-Computing-Implementing/dp/0124201253/ref=sr_1_130?s=books&ie=UTF8&qid=1409993132&sr=1-130


5、PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance

http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/ref=sr_1_129?s=books&ie=UTF8&qid=1409993132&sr=1-129


6、Information Security Analytics: Finding Security Insights, Patterns and Anomalies in Big Data

http://www.amazon.com/Information-Security-Analytics-Insights-Anomalies/dp/0128002077/ref=sr_1_140?s=books&ie=UTF8&qid=1409993182&sr=1-140


7、Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362/ref=sr_1_159?s=books&ie=UTF8&qid=1409993296&sr=1-159


8、Cyber Security Management: A Governance, Risk and Compliance Framework

http://www.amazon.com/Cyber-Security-Management-Governance-Compliance/dp/1472432096/ref=sr_1_157?s=books&ie=UTF8&qid=1409993296&sr=1-157


9、Integrated Security Systems Design, Second Edition: A Complete Reference for Building Enterprise-Wide Digital Security Systems

http://www.amazon.com/Integrated-Security-Systems-Design-Second/dp/0128000228/ref=sr_1_166?s=books&ie=UTF8&qid=1409993296&sr=1-166


10、Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

http://www.amazon.com/Building-Information-Security-Awareness-Program/dp/0124199674/ref=sr_1_189?s=books&ie=UTF8&qid=1409993431&sr=1-189


11、Security Architect: Careers in Information Security (BCS Guides to it Roles)

http://www.amazon.com/Security-Architect-Careers-Information-Guides/dp/1780172206/ref=sr_1_186?s=books&ie=UTF8&qid=1409993431&sr=1-186


12、Kali Linux CTF Blueprints

http://www.amazon.com/Kali-Linux-Blueprints-Cameron-Buchanan/dp/1783985984/ref=sr_1_203?s=books&ie=UTF8&qid=1409993494&sr=1-203


13、Secure Data Provenance and Inference Control with Semantic Web

http://www.amazon.com/Secure-Provenance-Inference-Control-Semantic/dp/1466569433/ref=sr_1_228?s=books&ie=UTF8&qid=1409993546&sr=1-228


目录
相关文章
|
7月前
|
JavaScript Java 测试技术
基于SpringBoot+Vue的个人健康管理系统的详细设计和实现(源码+lw+部署文档+讲解等)
基于SpringBoot+Vue的个人健康管理系统的详细设计和实现(源码+lw+部署文档+讲解等)
202 0
|
8月前
|
存储 Python
判断一个字符串中出现次数最多的字符,统计这个次数?
判断一个字符串中出现次数最多的字符,统计这个次数?
87 0
|
前端开发
HBuilderX运行时报404错误解决
HBuilderX运行时报404错误解决
HBuilderX运行时报404错误解决
|
8月前
|
PHP
composer selfupdate或composer self-update不管用解决办法
composer selfupdate或composer self-update不管用解决办法
148 0
|
数据安全/隐私保护
[虚幻引擎] UE DTBase64 插件说明 使用蓝图对字符串,字节数组或文件进行Base64加密解密
本插件可以在虚幻引擎中使用蓝图对字符串,字节数组,文件进行Base64的加密和解密。
195 0
|
消息中间件 设计模式 安全
Java技术专家成长路线总结(思维导图)
最近很多同学问如何进行Java入门学习以及构建自己的技术体系,不少人总感觉Java技术知识浩如烟海,网上资料又多如牛毛,根本不知道应该从哪里入手进行学习,另外觉得自己学习的内容零零碎碎不成体系,感觉十分的迷茫。为了解答大家的疑惑,笔者特意梳理了Java小白到技术专家成长过程中必备的技术体系(这次可是拿出来压箱底的技术总结思维导图)。希望这份技术成长路线总结可以对大家在学习Java的过程中有所帮助,在学习上可以做到有的放矢。
146 0
|
前端开发 Python 容器
tkinter 模块的最强辅助模块 —— tkintertools(万字详解)(一)
tkinter 模块的最强辅助模块 —— tkintertools(万字详解)(一)
225 0
|
8月前
|
移动开发 Kubernetes 测试技术
MSE服务治理最佳实践:基于Ingress-nginx网关实现全链路灰度
微服务架构下,有一些需求开发涉及到微服务调用链路上的多个微服务同时改动。通常每个微服务都会有灰度环境或分组来接受灰度流量。我们希望进入上游灰度环境的流量也能进入下游灰度的环境中,确保1个请求始终在灰度环境中传递。即使这个调用链路上有一些微服务应用不存在灰度环境,那么这些微服务应用在请求下游应用的时候依然能够回到下游应用的灰度环境中。我们通过 MSE 提供的全链路灰度能力,可以在不需要修改任何业务代码的情况下,轻松实现上述所说的全链路灰度能力。
MSE服务治理最佳实践:基于Ingress-nginx网关实现全链路灰度
|
网络安全
运行selenium脚本,出现Can not connect to the Service chromedriver解决方法汇总!
运行selenium脚本,出现Can not connect to the Service chromedriver解决方法汇总!
445 0
运行selenium脚本,出现Can not connect to the Service chromedriver解决方法汇总!
|
存储 监控 网络协议
GlusterFS常用命令
1、启动/关闭/查看glusterd服务   # /etc/init.d/glusterd start   # /etc/init.d/glusterd stop    # /etc/init.d/glusterd status 2、 开机自动启动glusterd服务   # chkconfig glusterd on # Red Hat    # update-rc.
1581 0