Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

WannaCry is just the beginning? The list of security books you need in the information age

2025-02-27 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Abstract: Since May 12, a worm malicious code based on Windows Network Sharing Protocol has been spreading worldwide. On the other hand, this is not necessarily a bad thing. At least to the world's users once again sounded the alarm, the rapid development of information technology such as the Internet, while bringing great well-being to people, but also brought unprecedented network security challenges.

Since May 12, a worm malicious code based on Windows Network Sharing Protocol has been spreading worldwide.

More than 100 countries have been unfortunately victimized. This kind of ** method is not new, but it is the first time such large-scale extortion has been carried out.

After the incident, enterprises in the field of Internet security quickly carried out research and actively provided security services and prevention tools. At the same time, the media also made a lot of reports to raise everyone's awareness of safety precautions.

At present, the software virus is still spreading, but the spread rate has slowed significantly.

On the other hand, this is not necessarily a bad thing. At least to the world's users once again sounded the alarm, the rapid development of information technology such as the Internet, while bringing great benefits to people, but also brought unprecedented network security challenges.

Although the spread of ransomware virus has slowed down, the awareness of network security cannot be relaxed. One WannaCry ends, thousands of WannaCry will appear...

This isn't the end, it's just the beginning. Welcome to the information age...

The following inventory of security technology books, hope that through this book list, you can stand firm in the information age, build a solid security fortress.

Blocking ***: Techniques, Strategies and Cases

Increase the cost of the system being destroyed, so that the *** will retreat

Steven M. Bellovin

Translated by Xu Fei, Xiong Gang and Li Zhen

Teach you to think about security as a systems problem, matching defenses with actual threats

So that the safety measures of enterprises will not be too strict and affect production efficiency, nor will they be too lax to give people an opportunity to take advantage of them.

Bug Wars: Essentials of Software Vulnerability Analysis

Tencent Cohen laboratory wushi, industry famous praise recommended!

Systematic, comprehensive and in-depth! Combined with many classic loopholes, in-depth analysis of loopholes *** actual combat!

by Lin Yaquan

Abandoning the short theory, combined with the classic vulnerability case, it is almost "a book written with debugger" vulnerability battlefield migration from PC to mobile

This book involves Windows and Android system platforms to systematically explain the various tools, theoretical techniques and practical methods required for software vulnerability analysis and utilization

At stake: 154 pieces of advice from a safety guru

American security masters analyze security in the Internet era, covering security and technology| economic| Humanities| psychological

by Bruce Schneier

Translated by Xu Fei, Wang Yan and Dai Shijian

Complex computer systems always have weaknesses that can be detected. Software, systems, hardware facilities, people, enterprise activities, etc. are all elements of building a security system.

This book analyzes the characteristics of safety from different angles such as technology, psychology and policy

The Road to Security-Web*** Technology and Practical Case Analysis (2nd Edition)

Case full solution Web*** technology, actual combat, actual combat!

Edited by Chen Xiaobing

Combined with the actual cases in the network ***, reproduce the wonderful process of the Web***

This book focuses on the practical application of Web*** technology through case studies, which is practical and rich in content.

Smart Hardware Security

A book to master the core technology of Internet of Things security!

Tan Xiaosheng, vice president of Qihoo 360, Yan Shuicheng, chief scientist of Qihoo 360,

XCon& Myth Action founder, god, Zhejiang University professor Xu Wenyuan and other famous people jointly recommended!

Edited by Liu Jianhao, Wang Aobo, Jia Wenxiao, etc.

Filling the gap in the smart hardware security book market

From the perspective of firmware, network security, wireless communication protocol security, control APP security, etc

Take common intelligent hardware as practical cases, analyze the security problems of Internet of Things, and put forward security suggestions

White Hat on Browser Security

White hat continues a new chapter for the first time focusing on safety, wind eye and super comprehensive| has depth| multi-instance

Written by Qian Wenxiang

Security experience from Tencent, professional guarantee from Wuyun platform

Browser threats vary from Web frontiers to browser boundary breaches

Covers specifications, functional implementation and rendering layers, actual combat *** all mainstream modern browsers

Python stunts: using Python to become the top ***

Multiple safety Daniu joint recommendation!

This book will be used as a professional book for students to learn "Myth-Information Security Talent Subversive Action"!

by TJ O'Connor

Translated by Cui Xiaochen, Wu Xiaoyin, etc.

Although there are many books on Python, there are few books that fully analyze Python from a security practitioner's perspective.

This book fills that gap: Python*** methods for *** testing, web analysis, network analysis, forensic analysis, and leveraging wireless devices.

Malicious Code Analysis

Whether or not you have a background and experience in malicious code analysis, you will benefit from this extremely rich book.

Michael Sikorski, Andrew Honig

Translated by Zhuge Jianwei, Jiang Hui, Zhang Guangkai

A comprehensive guide to malicious code analysis techniques that combines theory with practice

Once published, it won rave reviews in the industry and was unanimously recommended by industry insiders as an authoritative book for entry and promotion.

* *** Big Tracking: Core Principles and Practice of Network Forensics

A book to master intelligent mass intelligence analysis methods and skills based on big data!

Comprehensive, practical, fast grasp of network forensics core points and practice!

Sherri Davidoff, Jonathan Ham

Translated by Cui Xiaochen, Lu Daohong, etc.

Hidden Eagle Zhang Yuxiang solemnly recommended

the first book on cyberforensics.

Rich in content, easy to understand, providing complete network forensics analysis ideas and practical methods

"Revealing 0-day vulnerability mining technology for home routers"

The first book on home router security analysis! System analysis router hardware analysis way.

Technical points and practices can be extended to emerging fields such as intelligent IoT and industrial control systems!

Edited by Wu Shaohua, edited by Wang Wei and Zhao Xu

Starting from the home router, this paper comprehensively explains the relevant knowledge of router vulnerability analysis, vulnerability mining, router firmware extraction, hardware debugging, etc., supplemented by a large number of examples.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report