不错的安全书籍

来源:互联网 发布:笔记本电脑测评软件 编辑:程序博客网 时间:2024/04/30 05:07

http://www.amazon.cn/Advanced-Persistent-Threat-Hacking-The-Art-and-Science-of-Hacking-Any-Organization-Wrightson-Tyler/dp/0071828362/ref=sr_1_2?ie=UTF8&qid=1410155072&sr=8-2&keywords=Advanced+Persistent+Threat


http://www.amazon.com/s/ref=nb_sb_noss_1?url=node%3D377560011&field-keywords=big+data+security&rh=n%3A283155%2Cn%3A!1000%2Cn%3A5%2Cn%3A377560011%2Ck%3Abig+data+security


1、 Automated Firewall Analytics: Design, Configuration and Optimization

http://www.amazon.com/Automated-Firewall-Analytics-Configuration-Optimization/dp/3319103709/ref=sr_1_96?s=books&ie=UTF8&qid=1409992955&sr=1-96


2、Designing and Building Security Operations Center

http://www.amazon.com/Automated-Firewall-Analytics-Configuration-Optimization/dp/3319103709/ref=sr_1_96?s=books&ie=UTF8&qid=1409992955&sr=1-96


3、The Chief Information Security Officer: Roles and Responsibilities

http://www.amazon.com/Chief-Information-Security-Officer-Responsibilities/dp/1466517891/ref=sr_1_121?s=books&ie=UTF8&qid=1409993132&sr=1-121


4、CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security

http://www.amazon.com/CSA-Guide-Cloud-Computing-Implementing/dp/0124201253/ref=sr_1_130?s=books&ie=UTF8&qid=1409993132&sr=1-130


5、PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance

http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/ref=sr_1_129?s=books&ie=UTF8&qid=1409993132&sr=1-129


6、Information Security Analytics: Finding Security Insights, Patterns and Anomalies in Big Data

http://www.amazon.com/Information-Security-Analytics-Insights-Anomalies/dp/0128002077/ref=sr_1_140?s=books&ie=UTF8&qid=1409993182&sr=1-140


7、Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362/ref=sr_1_159?s=books&ie=UTF8&qid=1409993296&sr=1-159


8、Cyber Security Management: A Governance, Risk and Compliance Framework

http://www.amazon.com/Cyber-Security-Management-Governance-Compliance/dp/1472432096/ref=sr_1_157?s=books&ie=UTF8&qid=1409993296&sr=1-157


9、Integrated Security Systems Design, Second Edition: A Complete Reference for Building Enterprise-Wide Digital Security Systems

http://www.amazon.com/Integrated-Security-Systems-Design-Second/dp/0128000228/ref=sr_1_166?s=books&ie=UTF8&qid=1409993296&sr=1-166


10、Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

http://www.amazon.com/Building-Information-Security-Awareness-Program/dp/0124199674/ref=sr_1_189?s=books&ie=UTF8&qid=1409993431&sr=1-189


11、Security Architect: Careers in Information Security (BCS Guides to it Roles)

http://www.amazon.com/Security-Architect-Careers-Information-Guides/dp/1780172206/ref=sr_1_186?s=books&ie=UTF8&qid=1409993431&sr=1-186


12、Kali Linux CTF Blueprints

http://www.amazon.com/Kali-Linux-Blueprints-Cameron-Buchanan/dp/1783985984/ref=sr_1_203?s=books&ie=UTF8&qid=1409993494&sr=1-203


13、Secure Data Provenance and Inference Control with Semantic Web

http://www.amazon.com/Secure-Provenance-Inference-Control-Semantic/dp/1466569433/ref=sr_1_228?s=books&ie=UTF8&qid=1409993546&sr=1-228


0 1