Reproduced in: http://blog.idf.cn/book_intro/
Title |
Author |
Press |
Hackers (heroes of the computer revolution) |
Steven Levy |
Machinery Industry Press |
Hacker and painter |
Paul Graham |
People's post and telecommunications Publishing House |
Nuggets hacker |
Kevin Poulsen |
Electronic Industry Press |
Hacker empire and Philosophy |
William Irwin |
Shanghai Sanlian bookstore |
Intrusion Art |
Kevin D. Mitnick etc. |
Tsinghua University Press |
Hacker code |
Mark lasiinovic |
China Overseas Publishing House |
- Internet culture/thinking
Title |
Author |
Press |
Long Tail theory 2.0 |
Chris Anderson |
Citic Press |
Crowdsourcing-why the masses are pushing the future of business |
Jeff Hao |
Citic Press |
Zhiben's home storm |
Jiang qiping and others |
China youyi Publishing Company |
We have changed the Internet, or the Internet has changed us. |
Jeffrey stiber |
Citic Press |
Internet Evolution |
Liu Feng |
Tsinghua University Press |
Bit literacy |
Hema |
Electronic Industry Press |
Top of the waves |
Wu Jun |
Electronic Industry Press |
Technical Elements |
Kevin Kelly |
Electronic Industry Press |
Redo |
Jason Fried |
Citic Press |
The period in which privacy is not guaranteed |
Daniel sallev |
Jiangsu People's Publishing House |
Personal Information Protection |
Robert vamosi |
Machinery Industry Press |
- Humanities/Society/History
Title |
Author |
Press |
Steve Jobs' biography |
Walter aisacson |
Citic Press |
Living Law |
Kazuo rice |
Oriental Publishing House |
Social Psychology |
David G. myess |
People's post and telecommunications Publishing House |
World Is Flat |
Thomas Friedman |
Hunan Science and Technology Press |
Cultural Security |
Pan Yihe |
Zhejiang University Press |
Outline of Chinese History |
Bai Yang |
People's Literature Publishing House |
Global History: from history to the 21st Century |
Stafri Anos |
Peking University Press |
Deep truth |
Greg breden |
Citic Press |
Chrysanthemum and knife |
Ruth. bennidecket |
Kyushu Press |
Details of democracy |
Liu Yu |
Shanghai Sanlian bookstore |
Actor self-cultivation |
Stanislavski |
China Film Publishing House |
- Programming Language/Software Engineering
Title |
Author |
Press |
Assembly Language |
Wang Shuang |
Tsinghua University Press |
80 × 86 Assembly Language Programming Tutorial |
Yang Ji-Wen |
Tsinghua University Press |
Computer composition principle |
Tang shuofei |
Higher Education Press |
Introduction to Algorithms |
T. cormen etc. |
Machinery Industry Press |
PHP application security programming |
Tricia balglad etc. |
Machinery Industry Press |
PHP design patterns |
Aaron Saray |
Tsinghua University Press |
Python core programming |
Wesley J. Chun |
People's post and telecommunications Publishing House |
Mythical man-month (Annotated Version) |
Frederick P. Brooks |
People's post and telecommunications Publishing House |
Software Development Economics |
Walker Royce etc. |
Machinery Industry Press |
Software Overview |
Joel Spolsky |
People's post and telecommunications Publishing House |
Programmer's professionalism |
Robert C. Martin |
People's post and telecommunications Publishing House |
Revelation-building users' favorite products |
Marty Cagan |
Huazhong University of Science and Technology Press |
Everyone is a product manager |
Su Jie |
Electronic Industry Press |
Title |
Author |
Press |
Details of TCP/IP (Volume 1, Volume 2, and volume 3) |
W. Richard Steven s |
Machinery Industry Press |
Stack attack-layer-8 network security defense |
Michael Gregg etc. |
People's post and telecommunications Publishing House |
Wireless Network Security |
Dr. Cyrus perkari |
Electronic Industry Press |
Denial of Service Attack |
Li dequan |
Electronic Industry Press |
Hacker exposure: VoIP secrets and Solutions |
David endler |
Electronic Industry Press |
Grey Hat Security Manual |
Shon Harris |
Tsinghua University Press |
Hacker exposure: network security secrets and Solutions |
Stuart McClure |
Tsinghua University Press |
Metasploit penetration test Guide |
David Kennedy |
Electronic Industry Press |
Hacker exposure: Web Application Security |
Joel scambray |
Machinery Industry Press |
Hacker exposure: Wireless Network Security |
Johnny Cache |
Machinery Industry Press |
Secrets of Web Front-end hacker technology |
Zhong Chenming and Xu shaopei |
Electronic Industry Press |
- System development/security
Title |
Author |
Press |
Google Hacking Technical Manual |
Johnny long |
Machinery Industry Press |
Cainiao can defend against non-technical attacks |
Johnny long |
Science Press |
Cainiao's perfect password for preventing hackers |
Mark Burnett |
Science Press |
Computer Virus analysis and confrontation |
Fu Jianming and others |
Wuhan University Press |
Trojan technology secrets and defense |
Zhao Yuming |
Electronic Industry Press |
C ++ disassembly and Reverse Analysis Technology Secrets |
Qian linsong and others |
Machinery Industry Press |
Computer Virus Analysis and Prevention |
Wang Jianfeng and others |
Electronic Industry Press |
Virtual Security |
John hoopes |
Science Press |
Rootkits Windows Kernel Security Protection |
Greg Hoglund |
Tsinghua University Press |
Windows core programming |
Jeffrey Richter |
Tsinghua University Press |
Windows PE authoritative guide |
Qili |
Machinery Industry Press |
Computer Virus Protection Art |
Peter szor |
Machinery Industry Press |
Exploitation and prevention of kernel Vulnerabilities |
Enrico Perla |
Machinery Industry Press |
Security Vulnerability tracking |
Tom Gallagher |
Electronic Industry Press |
Hacker path: The art of vulnerability discovery |
Jon Erickson |
China Water Conservancy and hydropower Press |
BotNet (Network Program killer) |
Craig A. Schiller |
Science Press |
Reversing: reverse engineering secrets |
Eldad eilam |
Electronic Industry Press |
0-day security: Software Vulnerability Analysis Technology |
Failwest |
Electronic Industry Press |
Web Trojan attack and defense practices |
Ren Fei, etc. |
Electronic Industry Press |
Malicious Code forensics |
James M. aquilina |
Science Press |
Windows Kernel security programming |
Tan wenet |
Electronic Industry Press |
In-depth understanding of computer systems |
Randal E. Bryant |
Machinery Industry Press |
Gray hat hacker |
Allen Harper |
Tsinghua University Press |
* All the books above are from the IDF lab and members of IDF lab. You are welcome to leave a comment!
* Thanks for the recommendation
Thanks to Cheng Chong, information security director of Kingsoft Software Group, for recommending "actor self-cultivation".
(Reprinted) Book recommendation