10.1. Recommended Resources¶
10.1.1. Book List¶
10.1.1.1. Frontend¶
Web Trouble
White hats talk about web security
White hats talk about browser security (Wenxiang Qian)
Web front-end hacking techniques revealed
Analysis and Defense of XSS Cross-Site Scripting Attacks
SQL Injection Attack and Defense
10.1.1.2. Network¶
Understanding linux network internals
TCP/IP Architecture, Design, and Implementation in Linux
Linux Kernel Networking: Implementation and Theory
Bulletproof SSL and TLS
UNIX Network Programming
Detailed explanation of TCP/IP protocol
10.1.1.3. SEO¶
The Art of SEO
10.1.1.4. Wireless Attack and Defense¶
Wireless network security attack and defense
Advanced wireless network security attack and defense
Hackers Revealed - Near Source Penetration Testing (Chai Kunzhe, etc.)
10.1.1.5. Hacking Programming¶
Gray Hat Python
10.1.1.7. Data Security¶
Big data governance and security from theory to open source practice (Liu Chi, etc.)
Enterprise big data processing Spark, Druid, Flume and Kafka application practice (Xiao Guanyu)
Data Security Architecture Design and Practice (Zheng Yunwen)
10.1.1.8. Machine Learning and Network Security¶
Web Security Deep Learning Practice (Liu Yan)
Introduction to Machine Learning for Web Security (Liu Yan)
Reinforcement Learning and GAN for Web Security (Liu Yan)
Introduction to Adversarial Samples in AI Security (Brother Pocket)
10.1.1.9. Safety Construction¶
Introduction to Enterprise Security Construction - Building Enterprise Network Security Based on Open Source Software (Liu Yan)
Enterprise Security Construction Guide - Security Architecture and Technical Practice in the Financial Industry (Nie Jun, etc.)
Security Architecture of Large Internet Enterprises (Shi Zuwen)
CISSP Official Study Guide
CISSP Certification Exam Guide
Linux system security defense-in-depth, security scanning and intrusion detection (Xu Feng)
10.1.1.10. General¶
In-depth analysis of web security
Hacking Tips - A Practical Guide to Penetration Testing
Hacker attack and defense technology collection - web combat articles
10.1.1.11. Legal¶
Information Security Standards and Laws and Regulations (Second Edition) (Note: Wuhan University Press)
10.1.2. WebSite¶
10.1.3. Blog¶
10.1.4. Bug Bounty¶
10.1.5. Experimental Environment¶
10.1.5.2. Domain Lab Environment¶
10.1.6. Knowledge Base¶
10.1.6.1. Awesome series¶
10.1.6.2. Bug Hunting¶
HowToHunt Tutorials and Things to Do while Hunting Vulnerability
10.1.6.3. Java¶
learnjavabug Java security related vulnerabilities and technical demos
10.1.6.4. Red-Blue confrontation¶
atomic red team Small and highly portable detection tests based on MITRE’s ATT&CK
10.1.1.6. Social Engineering¶
Social Engineering: Human Vulnerabilities in Security Systems
The art of anti-deception
Anti-Invasion Art