亚马逊不错的书籍

1.

http://www.amazon.com/Qualities-Highly-Secure-Software/dp/1439814465/ref=sr_1_111?s=books&ie=UTF8&qid=1330409500&sr=1-111

2.

http://www.amazon.com/Threats-Countermeasures-Advances-Information-Security/dp/1466609788/ref=sr_1_127?s=books&ie=UTF8&qid=1330409579&sr=1-127

 

3.

http://www.amazon.com/IBM-i-Security-Administration-Compliance/dp/1583473734/ref=sr_1_138?s=books&ie=UTF8&qid=1330409605&sr=1-138

 

4.

http://www.amazon.com/Secure-Software-Design-Theodor-Richardson/dp/1449626327/ref=sr_1_179?s=books&ie=UTF8&qid=1330409669&sr=1-179

 

5.

http://www.amazon.com/Critical-Infrastructure-Security-Assessment-Prevention/dp/1845645626/ref=sr_1_213?s=books&ie=UTF8&qid=1330409723&sr=1-213

 

6.

http://www.amazon.com/gp/product/1439853207/ref=ox_sc_act_title_1?ie=UTF8&m=ATVPDKIKX0DER

 

7.

http://www.amazon.com/gp/product/0071744002/ref=ox_sc_act_title_2?ie=UTF8&m=ATVPDKIKX0DER

 

8.

http://www.amazon.com/gp/product/143986621X/ref=ox_sc_act_title_3?ie=UTF8&m=ATVPDKIKX0DER

 

9.

http://www.amazon.com/Secure-Resilient-Software-Development-Merkow/dp/143982696X/ref=pd_luc_hashrec_01_03_t_lh

 

10.

http://www.amazon.com/Information-Security-Governance-Engineering-Management/dp/0470131187/ref=pd_rhf_sc_shvl18

 

11.

http://www.amazon.com/PCI-Compliance-Understand-Implement-Effective/dp/1597494992/ref=pd_rhf_sc_shvl19

 

12.

http://www.amazon.com/Oracle-Secure-Standard-Software-Engineering/dp/0321803957/ref=sr_1_521?s=books&ie=UTF8&qid=1330832815&sr=1-521

 

13.

http://www.amazon.com/Counterintelligence-Operational-Security-Glenn-Voelz/dp/193724671X/ref=sr_1_540?s=books&ie=UTF8&qid=1330832841&sr=1-540

 

14.

http://www.amazon.com/Qualified-Security-Analyst-Penetration-Testing/dp/0763775002/ref=sr_1_542?s=books&ie=UTF8&qid=1330832871&sr=1-542

 

15.

http://www.amazon.com/Open-Enterprise-Security-Architecture-O-ESA/dp/9087536720/ref=sr_1_548?s=books&ie=UTF8&qid=1330832871&sr=1-548

 

16.

http://www.amazon.com/Microsoft-Windows-Security-Essentials-Darril/dp/111801684X/ref=sr_1_646?s=books&ie=UTF8&qid=1330833090&sr=1-646

 

17.

http://www.amazon.com/ISO-27002-Foundation-Complete-Certification/dp/1743044976/ref=sr_1_687?s=books&ie=UTF8&qid=1330833192&sr=1-687

 

18.

http://www.amazon.com/Information-Security-Management-Maturity-O-ISM3/dp/9087536658/ref=sr_1_713?s=books&ie=UTF8&qid=1330833234&sr=1-713

 

19.

http://www.amazon.com/Oracle-Database-11g-R2-Encryption/dp/1936930129/ref=sr_1_725?s=books&ie=UTF8&qid=1330833262&sr=1-725

 

20.

http://www.amazon.com/Risk-Management-Group-Security-Publishing/dp/9087536631/ref=sr_1_731?s=books&ie=UTF8&qid=1330833262&sr=1-731

 

21.

http://www.amazon.com/Web-Commerce-Security-Development-ebook/dp/B004Z7J99W/ref=sr_1_737?s=books&ie=UTF8&qid=1330833339&sr=1-737

 

22.

http://www.amazon.com/Practical-Risk-Management-Mark-Scherling/dp/1439856532/ref=sr_1_741?s=books&ie=UTF8&qid=1330833339&sr=1-741

 

23.

http://www.amazon.com/practical-guide-implementing-maintaining-compliance/dp/1849281866/ref=sr_1_746?s=books&ie=UTF8&qid=1330833373&sr=1-746

 

24.

http://www.amazon.com/Engineering-Secure-Software-Systems-International/dp/364219124X/ref=sr_1_776?s=books&ie=UTF8&qid=1330833413&sr=1-776

 

25.

http://www.amazon.com/Securing-SQL-Server-Protecting-Attackers/dp/1597496251/ref=sr_1_819?s=books&ie=UTF8&qid=1330833507&sr=1-819

 

26.

http://www.amazon.com/Honeypots-New-Paradigm-Information-Security/dp/1578087082/ref=sr_1_828?s=books&ie=UTF8&qid=1330833507&sr=1-828

 

27.

http://www.amazon.com/Ethical-Issues-Security-Monitoring-Healthcare/dp/1609601742/ref=sr_1_883?s=books&ie=UTF8&qid=1330833613&sr=1-883

 

28.

http://www.amazon.com/Web-Application-Security-Communications-Information/dp/3642161197/ref=sr_1_902?s=books&ie=UTF8&qid=1330833650&sr=1-902

 

29.

http://www.amazon.com/System-Assurance-Beyond-Detecting-Vulnerabilities/dp/0123814146/ref=sr_1_908?s=books&ie=UTF8&qid=1330833650&sr=1-908

 

30.

http://www.amazon.com/Pro-PHP-Security-Implementation-ebook/dp/B004GXAGZG/ref=sr_1_933?s=books&ie=UTF8&qid=1330833698&sr=1-933

 

31.

http://www.amazon.com/Adaptive-Security-Management-Architecture-Tiller/dp/0849370523/ref=sr_1_1033?s=books&ie=UTF8&qid=1330833828&sr=1-1033

 

32.

http://www.amazon.com/Security-Engineering-Dependable-Distributed-ebook/dp/B004BDOZI0/ref=sr_1_1056?s=books&ie=UTF8&qid=1330833850&sr=1-1056

 

33.

http://www.amazon.com/Handbook-Database-Security-Applications-Trends/dp/1441943056/ref=sr_1_1073?s=books&ie=UTF8&qid=1330833878&sr=1-1073

 

34.

http://www.amazon.com/Open-Source-Systems-Security-Certification/dp/1441945903/ref=sr_1_1078?s=books&ie=UTF8&qid=1330833878&sr=1-1078

 

35.

http://www.amazon.com/SAP-Security-Risk-Management-Edition/dp/1592293557/ref=sr_1_1128?s=books&ie=UTF8&qid=1330833944&sr=1-1128

 

36.

http://www.amazon.com/Secure-Java-Application-Development-ebook/dp/B007BN45JG/ref=sr_1_1171?s=books&ie=UTF8&qid=1330834017&sr=1-1171

 

37.

http://www.amazon.com/Auditing-Infrastructures-Compliance-Information-Assurance/dp/0763791814/ref=sr_1_1175?s=books&ie=UTF8&qid=1330834017&sr=1-1175

 

 38.

http://www.amazon.com/Secure-Resilient-Software-Requirements-Testing/dp/143986621X/ref=sr_1_1?ie=UTF8&qid=1330834715&sr=8-1

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值