Home >Operation and Maintenance >Safety >27 recommended information security books

27 recommended information security books

王林
王林forward
2020-09-17 17:47:264612browse

27 recommended information security books

The following books are ranked in no particular order. They are compiled from friends’ recommendations and network ratings. They are all real book review feedback after reading. I hope it can give you some reference. Of course, there are also introductory information security You can choose from videos, documents, information and more, depending on your personal preference.

(Recommended tutorial: web server security)

[Technical category - 17 must-read books for white hat beginners]

Android software security and reverse engineering Analysis

Authoritative Guide to Android Security Attack and Defense

White Hat Talks about Web Security

Malicious Code Analysis Practice

Intranet Security Attack and Defense

Penetration A Complete Beginner's Guide to Testing

0day Security Vulnerability Analysis (2nd Edition)

Hacker Exposure Series

Web Security Deep Analysis

Web Front-end Hacking Technology Revealing

Core Principles of Reverse Engineering

Packet Analysis "Wireshark Packet Analysis Practice"

The Art of Intrusion

Hackers and Painters

The Secret to Cybersecurity

CISO Desk Reference Guide: A practical guide for CISOs

Data and Goliath

[Management category - 10 books related to enterprise security]

CISSP Official Study Guide

Open Source Security Operation and Maintenance Platform OSSI Best Practices

Zero Trust Network Builds Security Systems in Untrusted Networks

Intelligence Driven Emergency Response

Authoritative Guide to Log Management and Analysis

Network Security Situation Awareness Extraction, Understanding and Prediction

Bank Information Security Technology and Management System

Industrial Control Network Security Technology Design and Deliver More Secure Software with Practice

Threat Patterns

Advanced Guide to Internet Enterprise Security

The above is the detailed content of 27 recommended information security books. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:secpulse.com. If there is any infringement, please contact admin@php.cn delete