现在的位置: 首页 > 自动控制 > 工业·编程 > 正文

网络安全书籍介绍

2014-01-29 21:27 工业·编程 ⁄ 共 1609字 ⁄ 字号 暂无评论
文章目录

1     网络安全基础

1.1    黑客大曝光系列

《黑客大曝光》是全球销量第一的计算机信息安全图书,被信息安全界奉为圣经。作者独创“黑客大曝光方法学”,从攻防两方面系统阐述了最常见的黑客入侵手段及对应的防御策略。

McGraw.HackingExposed.6Ed.Network Security Secrets And Solutions.2009.pdf

HackingExposed Web Applications, Second Edition

HackingExposed Windows, Third Edition

HackingExposed Linux, Third Edition

HackingExposed VoIP

HackingExposed Wireless

HackingExposed Web 2.0

Hacker’sChallenge 3

2     端口扫描

2.1    Nmap

Syngress - Secrets of Network Cartography -A Comprehensive Guide to Nmap - Complete.pdf

nmap-mindmap.pdf

nmap-mindmap.pdf

Fyodor-David-BlackHatUSA-2010-Slides.pdf

Fyodor-David-Defcon18-Slides.pdf

bhdc08-slides-fyodor.pdf

Fyodor-David-BlackHatUSA-2010-Slides.pdf

Fyodor-David-Defcon18-Slides.pdf

2.2    NetCat

Netcat_Tutorial.pdf

3     漏洞扫描

3.1    Nessus

Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf

Syngress.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.Sep.2005.pdf

4     渗透测试

4.1    Basic

Hacking.The.Art.of.Exploitation.2nd.Edition.Feb.2008.pdf

Penetration Testingprocedures&methologies .pdf

Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.pdf

The Basics of Hacking and PenetrationTesting-Slicer.pdf

4.2    BackTrack

BackTrack 4 Assuring Security byPenetration Testing.pdf

4.3    Metasploit

Metasploit The Penetration Tester’sGuide.pdf

5     GoogleHacking

Google Hacking For Penetration Testers.pdf

Google_Tips_Tricks.pdf

6     社会工程学

The_Art_of_Deception.pdf

7     逆向工程

Reversing Secrets of ReverseEngineering.pdf

Rootkits Subverting the Windows Kernel.pdf

8     黑客小说

8.1    Stealing the Network系列

syngress - stealing the network how to ownthe box.pdf

Syngress - Stealing the Network - How toOwn a Shadow.pdf

Stealing the Network How to Own aContinent.pdf

给我留言

留言无头像?