标签:des android style http color os io ar strong
看到作者列出的书籍列表,对于信息安全的初学者来说,能很好的选择教材,鉴于只有英文版,我尝试翻译成中文以供参考,初次翻译,翻译的不好请见谅。
原文链接:http://dfir.org/?q=node/8/
注:对于所有的书籍链接,我都会寻找中文版重新链接,如无中文版,则按原文链接英文版。并且所有书籍名称保留英文名称
这是一个我建立的一个有关计算机安全的书籍列表,它们都是很有用的“计算机安全”这个主题的相关数据。包括:数字取证、 事件响应, 恶意软件分析和逆向工程。书籍的范围从入门教材到高级的研究课题都有。有一些书可能看起来过时了,但是其中包含的信息对现在来学习的人们依然非常有用, 并且要想在信息安全领域成为一个专家,其中有许多知识点是必不可少的。
请注意,为了避免造成给书籍排名的印象,每个类别的都是按照字母表的顺序排列,类别中的书也是按照字母表的顺序排列的(译者注:顺序是按书籍英文名称排序)。
如果你发现了这个列表中的错误或者你认为某本书也应该加到这个列表里的话,请联系我。我仅列出了那些我个人阅读过,并且自愿为之担保的书籍。
应用安全 - 本地应用
| 标题 | 注解 | 技术等级 |
|---|---|---|
| 源码审计的圣经级读物 | 中高级。需要能阅读C/C++代码 | |
|
写牢固的底层代码最好的书籍 |
对于所有能阅读C/C++的人都很容易 |
应用安全 - web应用
| 标题 | 注释 | 技术等级 |
|---|---|---|
|
有许多详细的web安全主题 |
从基础进阶到高级主题 | |
|
有关于数据库攻击的最详细的书 |
从基础进阶到高级主题 | |
| The Tangled Web | A detailed look at the foundations of web protocols followed by a thorough examination of their weakness. Highly, highly recommended | Accessible to all. The beginning chapters cover background needed for later advanced topics |
| The Web Application Hacker‘s Handbook | Covers a wide range of web security issues | Intermediate |
Cryptography
| Title | Comments | Technical Level |
|---|---|---|
| Applied Cryptography | The standard for learning cryptography | Ranges from background and introduction to deep algorithms and security considerations |
| Introduction to Modern Cryptography | A well-done, formal look at cryptography. Used in many graduate level computer science programs | Advanced - full understanding requires deep mathematical knowledge |
Database Forensics
| Title | Comments | Technical Level |
|---|---|---|
| Microsoft SQL Server Internals | Examination of MSSQL akin to the OS-level examination of Windows Internals | Intermediate - learn database basics before reading |
| SQL Server Forensic Analysis | A deep look at forensic analysis of MSSQL Systems | Intermediate - learn database basics before reading |
Digital Forensics and Incident Response
| Title | Comments | Technical Level |
|---|---|---|
| File System Forensic Analysis | The definitive resource for file system forensics | Intermediate-Advanced |
| Forensic Discovery | A foundational text of computer forensics by two of the earliest pioneers | Intermediate |
| Real Digital Forensics | A concise introduction to forensic processes | Beginner-Intermediate |
| Windows Forensic Analysis, Second Edition | This book, along with the 4th edition, are the best books available for Windows disk forensics | Ranges from basic concepts to advanced analysis |
| Windows Forensic Analysis, Fourth Edition | This book, along with the 2nd edition, are the best books available for Windows disk forensics | Ranges from basic concepts to advanced analysis |
Exploitation / Penetration Testing
| Title | Comments | Technical Level |
|---|---|---|
| A Guide to Kernel Exploitation | Advanced exploitation of a range of operating systems | Advanced |
| Android Hacker‘s Handbook | A deep dive into exploitation of Android systems | Intermediate |
| Hacking: The Art of Exploitation, 1st Edition | A foundational work of low-level exploitation | Intermediate |
| iOS Hacker‘s Handbook | A deep dive into exploitation of iOS devices | Intermediate-Advanced |
| The Mac Hacker‘s Handbook | A deep dive into exploitation of Mac systems | Intermediate-Advanced |
| Rtfm: Red Team Field Manual | A concise, well written guide that should be in every penetration tester‘s travel bag | Accessible to all people with a pen test background |
| The Shellcoder‘s Handbook | Crafting shellcode and exploits | Intermediate-Advanced |
Linux Usage
| Title | Comments | Technical Level |
|---|---|---|
| Linux in a Nutshell | The best text to learn how to use Linux | Beginner-Intermediate |
| Running Linux | Another great text from which to learn Linux | Beginner-Intermediate |
Malware Development and Analysis
Note: Many of these books contain information related to Reverse Engineering
| Title | Comments | Technical Level |
|---|---|---|
| The Art of Computer Virus Research and Defense | A deep look at many facets of malware analysis | Intermediate |
| Malware Analyst‘s Cookbook | A "recipe" approach to many topics in malware analysis | Intermediate-Advanced |
| Malware Forensics | A well done introduction to malware analysis | Beginner |
| Practical Malware Analysis | A very approachable book to many topics in malware analysis | Intermediate |
| Rootkits: Subverting the Windows Kernel | A study of many rootkit techniques still in use today | Intermediate-Advanced |
| The Rootkit Arsenal | An 800 page epic of rootkit development and analysis | Intermediate-Advanced |
Memory Forensics
| Title | Comments | Technical Level |
|---|---|---|
| The Art of Memory Forensics | A 900 page exploration of memory forensics across the major operating systems. NOTE: I am a co-author of this book | Ranges from introductory material to advanced analysis |
| What Makes It Page? | A deep look into the Windows memory manager | Intermediate |
Network Forensics
| Title | Comments | Technical Level |
|---|---|---|
| The Practice of Network Security Monitoring | Beyond just packet analysis to how to integrate network forensics into a real world environment | Intermediate |
| Practical Packet Analysis | An excellent resource for learning to identify and analyze network traffic | Beginner-Intermediate |
| Wireshark (R) 101 | A deep exploration of Wireshark | Beginner-Intermediate |
Networking
| Title | Comments | Technical Level/th> |
|---|---|---|
| CCNA Cisco Certified Network Associate Study Guide | A primer on real world networking and networks | Intermediate |
| CompTIA Network+ All-In-One Exam Guide | An essential book for those looking to learn networking | Beginner |
| TCP/IP Illustrated | The Bible of networking protocols. A must read | Intermediate |
Operating Systems Internals - General
| Title | Comments | Technical Level |
|---|---|---|
| Intel Architecture Manuals | Very well done documentation on the hardware architecture. Free to download | Intermediate-Advanced |
| Modern Operating Systems | The classic dinosaur book from Tanenbaum | Intermediate-Advanced |
Operating Systems Internals - Linux
| Title | Comments | Technical Level |
|---|---|---|
| Linux Device Drivers, 3rd Edition | Best resource to learn Linux‘s driver architecture | Intermediate-Advanced |
| Linux Kernel Development, 3rd Edition | Rob Love on programming in the Linux kernel | Intermediate-Advanced |
| The Linux Programming Interface | Excellent book on programming the Linux environment | Intermediate-Advanced |
| Understanding the Linux Kernel, Third Edition | The equivalent of Windows Internals for Linux | Intermediate-Advanced |
Operating Systems Internals - Mac
| Title | Comments | Technical Level |
|---|---|---|
| Mac OS X Internals: A Systems Approach | Windows Internals for Mac | Intermediate-Advanced |
| Mac OS X and iOS Internals | Read this after reading Mac OS X Internals | Intermediate-Advanced |
Operating Systems Internals - Windows
| Title | Comments | Skill Level |
|---|---|---|
| Windows Internals | Read this book if you want to understand Windows | Intermediate-Advanced |
| Windows System Programming (4th Edition) | A step-by-step guide through the Windows API | Intermediate |
Programming - Concepts and Algorithms
| Title | Comments | Technical Level |
|---|---|---|
| Compilers: Principles, Techniques, and Tools | The famous dragon book on compilers | Advanced - Don‘t read until you have a solid understanding of programming and runtime environments |
| Design Patterns | Required reading for any serious programmer | Intermediate |
| Linkers and Loaders | Required reading for understanding program linking and runtime loading | Intermediate |
Programming - Language Specific
Note: The reason there are few books here is due to languages having amazing learning resources online
| Title | Comments | Technical Level |
|---|---|---|
| Advanced Programming in the UNIX(R) Environment | Deep exploration of programming related to Linux, Mac, and BSD | Beginner-Intermediate |
| The C Programming Language, 2nd Edition | "K and R" - required if you want to be proficient with C | Intermediate-Advanced |
| Violent Python | Learn Python programming and directly apply it to forensics and security | Basic to advanced topics |
Reverse Engineering
| Title | Comments | Technical Level |
|---|---|---|
| Assembly Language Step-by-step | The best resource to learn assembly. Later books focused on "high level" assembly as opposed to actual instructions | Intermediate-Advanced |
| Hacker Disassembling Uncovered | A great resource for advanced topics in reverse engineering | Intermediate-Advanced |
| Hacking the Xbox | A well written and fun book from which to learn reversing | Intermediate |
| The IDA Pro Book | The best resource to learn IDA | Intermediate |
| Reversing: Secrets of Reverse Engineering | One of my favorite books. A chapter is dedicated to reversing a Windows API back to C so perfectly that compiling it matches the hash of the Windows DLL | Intermediate-Advanced |
| Practical Reverse Engineering | Reversing across Intel and ARM | Intermediate |
Tradecraft - Digital
| Title | Comments | Technical Level |
|---|---|---|
| Silence on the Wire | lcamtuf‘s exploration of vulnerabilities and attacks that most people would never think of. Strongly recommended | Beginner-Advanced |
Tradecraft - Traditional
Note: I originally found several of these books from The Grugq‘s list
| Title | Comments | Technical Level |
|---|---|---|
| The Art of Intelligence | Tradecraft and real-world analysis from Henry Crumpton | Beginner-Intermediate |
| Chinese Intelligence Operations | A well-written, deep study of Chinese intelligence services | Advanced |
| See No Evil | Tradecraft and lessons from a former CIA analyst in the Middle East | Intermediate |
| Spy Handler: Memoir of a KGB Officer | Written by the KGB officer whom handled Robert Hanssen and Aldrich Ames. A great text to learn real world tactics and techniques | Beginner-Intermediate |
| Terrorism and Counterintelligence: How Terrorist Groups Elude Detection | A deep examination of modern terrorist groups and counterintelligence use | Intermediate |
| Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer | Read this first - a textbook on how to be a counter intel officer along with terms, techniques, and tactics | Beginner - make this your first book |
标签:des android style http color os io ar strong
原文地址:http://www.cnblogs.com/zer0Black/p/3959886.html