(Reprinted) Book recommendation

Source: Internet
Author: User
Tags idf

Reproduced in: http://blog.idf.cn/book_intro/

  • Hacker culture/biography

Title

Author

Press

Hackers (heroes of the computer revolution)

Steven Levy

Machinery Industry Press

Hacker and painter

Paul Graham

People's post and telecommunications Publishing House

Nuggets hacker

Kevin Poulsen

Electronic Industry Press

Hacker empire and Philosophy

William Irwin

Shanghai Sanlian bookstore

Intrusion Art

Kevin D. Mitnick etc.

Tsinghua University Press

Hacker code

Mark lasiinovic

China Overseas Publishing House

  • Internet culture/thinking

Title

Author

Press

Long Tail theory 2.0

Chris Anderson

Citic Press

Crowdsourcing-why the masses are pushing the future of business

Jeff Hao

Citic Press

Zhiben's home storm

Jiang qiping and others

China youyi Publishing Company

We have changed the Internet, or the Internet has changed us.

Jeffrey stiber

Citic Press

Internet Evolution

Liu Feng

Tsinghua University Press

Bit literacy

Hema

Electronic Industry Press

Top of the waves

Wu Jun

Electronic Industry Press

Technical Elements

Kevin Kelly

Electronic Industry Press

Redo

Jason Fried

Citic Press

The period in which privacy is not guaranteed

Daniel sallev

Jiangsu People's Publishing House

Personal Information Protection

Robert vamosi

Machinery Industry Press

  • Humanities/Society/History

Title

Author

Press

Steve Jobs' biography

Walter aisacson

Citic Press

Living Law

Kazuo rice

Oriental Publishing House

Social Psychology

David G. myess

People's post and telecommunications Publishing House

World Is Flat

Thomas Friedman

Hunan Science and Technology Press

Cultural Security

Pan Yihe

Zhejiang University Press

Outline of Chinese History

Bai Yang

People's Literature Publishing House

Global History: from history to the 21st Century

Stafri Anos

Peking University Press

Deep truth

Greg breden

Citic Press

Chrysanthemum and knife

Ruth. bennidecket

Kyushu Press

Details of democracy

Liu Yu

Shanghai Sanlian bookstore

Actor self-cultivation

Stanislavski

China Film Publishing House

  • Programming Language/Software Engineering

Title

Author

Press

Assembly Language

Wang Shuang

Tsinghua University Press

80 × 86 Assembly Language Programming Tutorial

Yang Ji-Wen

Tsinghua University Press

Computer composition principle

Tang shuofei

Higher Education Press

Introduction to Algorithms

T. cormen etc.

Machinery Industry Press

PHP application security programming

Tricia balglad etc.

Machinery Industry Press

PHP design patterns

Aaron Saray

Tsinghua University Press

Python core programming

Wesley J. Chun

People's post and telecommunications Publishing House

Mythical man-month (Annotated Version)

Frederick P. Brooks

People's post and telecommunications Publishing House

Software Development Economics

Walker Royce etc.

Machinery Industry Press

Software Overview

Joel Spolsky

People's post and telecommunications Publishing House

Programmer's professionalism

Robert C. Martin

People's post and telecommunications Publishing House

Revelation-building users' favorite products

Marty Cagan

Huazhong University of Science and Technology Press

Everyone is a product manager

Su Jie

Electronic Industry Press

  • Network Protocol/security

Title

Author

Press

Details of TCP/IP (Volume 1, Volume 2, and volume 3)

W. Richard Steven s

Machinery Industry Press

Stack attack-layer-8 network security defense

Michael Gregg etc.

People's post and telecommunications Publishing House

Wireless Network Security

Dr. Cyrus perkari

Electronic Industry Press

Denial of Service Attack

Li dequan

Electronic Industry Press

Hacker exposure: VoIP secrets and Solutions

David endler

Electronic Industry Press

Grey Hat Security Manual

Shon Harris

Tsinghua University Press

Hacker exposure: network security secrets and Solutions

Stuart McClure

Tsinghua University Press

Metasploit penetration test Guide

David Kennedy

Electronic Industry Press

Hacker exposure: Web Application Security

Joel scambray

Machinery Industry Press

Hacker exposure: Wireless Network Security

Johnny Cache

Machinery Industry Press

Secrets of Web Front-end hacker technology

Zhong Chenming and Xu shaopei

Electronic Industry Press

  • System development/security

Title

Author

Press

Google Hacking Technical Manual

Johnny long

Machinery Industry Press

Cainiao can defend against non-technical attacks

Johnny long

Science Press

Cainiao's perfect password for preventing hackers

Mark Burnett

Science Press

Computer Virus analysis and confrontation

Fu Jianming and others

Wuhan University Press

Trojan technology secrets and defense

Zhao Yuming

Electronic Industry Press

C ++ disassembly and Reverse Analysis Technology Secrets

Qian linsong and others

Machinery Industry Press

Computer Virus Analysis and Prevention

Wang Jianfeng and others

Electronic Industry Press

Virtual Security

John hoopes

Science Press

Rootkits Windows Kernel Security Protection

Greg Hoglund

Tsinghua University Press

Windows core programming

Jeffrey Richter

Tsinghua University Press

Windows PE authoritative guide

Qili

Machinery Industry Press

Computer Virus Protection Art

Peter szor

Machinery Industry Press

Exploitation and prevention of kernel Vulnerabilities

Enrico Perla

Machinery Industry Press

Security Vulnerability tracking

Tom Gallagher

Electronic Industry Press

Hacker path: The art of vulnerability discovery

Jon Erickson

China Water Conservancy and hydropower Press

BotNet (Network Program killer)

Craig A. Schiller

Science Press

Reversing: reverse engineering secrets

Eldad eilam

Electronic Industry Press

0-day security: Software Vulnerability Analysis Technology

Failwest

Electronic Industry Press

Web Trojan attack and defense practices

Ren Fei, etc.

Electronic Industry Press

Malicious Code forensics

James M. aquilina

Science Press

Windows Kernel security programming

Tan wenet

Electronic Industry Press

In-depth understanding of computer systems

Randal E. Bryant

Machinery Industry Press

Gray hat hacker

Allen Harper

Tsinghua University Press

* All the books above are from the IDF lab and members of IDF lab. You are welcome to leave a comment!

* Thanks for the recommendation

Thanks to Cheng Chong, information security director of Kingsoft Software Group, for recommending "actor self-cultivation".

(Reprinted) Book recommendation

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.