阿里云安全专家,主要负责阿里云云产品安全。
https://www.coalfire.com/
https://blog.ripstech.com/2016/roundcube-command-execution-via-email/ ...
http://www.tableau.com/zh-cn/products/desktop#features http://www.
https://github.com/openstack/syntribos
http://tagvault.org/
http://timeglider.com/timeline/5ca2daa6078caaf4
http://blog.csdn.net/youkawa/article/details/45696317
DFAX Digital forensics analysis expression CRE Common remediation enumration DRAPA IACS CMU ...
https://sites.google.com/site/bletchleypark2/misc/cyber-grand-challenge http://bitblaze.
https://community.rapid7.com/community/metasploit/blog/2016/06/14/asa-hack https://www.
http://sapper.blog.sohu.com/167016924.html
http://thenewstack.io/hypernetes-brings-multi-tenancy-microservices/ ...
http://ecc.zpedu.com/
http://devops.com/2015/04/06/automated-security-testing-continuous-delivery-pipeline/ ...
Twitter for Museums: Strategies and Tactics for Success
https://aws.amazon.com/cn/training/course-descriptions/devops-engineering/ https://www.
Hunting-Your-Memory-Heather-Adkins-Google.pdf The-Remediation-Ballet-Performing-the-Delicate-Dance-of-Clean-Up-Matt-Linton-Google.
https://www.us-cert.gov/essa http://csrc.nist.
https://github.com/ciscocsirt/malspider
https://technet.microsoft.com/zh-cn/dd630684.aspx#OTHER https://msdn.
https://blogs.technet.microsoft.com/privatecloud/2014/11/18/microsoft-infrastructure-as-a-servi...
http://iase.disa.mil/stigs/Pages/index.aspx
https://sourceforge.net/p/linux-ima/wiki/Home/ http://blog.
https://resilience.enisa.europa.eu/cloud-computing-certification/ https://www.
http://blogs.microsoft.com/cybertrust/2015/10/08/cloud-security-controls-series-penetration-te...
https://nsa.gov1.info/dni/nsa-ant-catalog/servers/index.
http://www.gartner.com/technology/reprints.
https://scans.io/
https://www.google.com.hk/?gws_rd=cr,ssl#safe=strict&q=COMPSAC+2015 http://www.
http://www.thefederation.org/process.cfm?PageID=1
http://www.sersc.org/journals/IJHIT/vol8_no10_2015.php
https://heimdalsecurity.com/blog/byod-security/
https://www.skyhighnetworks.com/
site:cyberwar.nl filetype:pdf
透视网络空间思路 1. 组件识别 2. 组件之间的层级关系 3. 组件高一维度的设备信息 4.
https://www.ida.gov.sg/Tech-Scene-News/ICT-Standards-and-Framework/MTCS-Certification-Scheme http://www.
https://www.jinfowar.com/category/journal/volume12-1/
http://www.dmtk.io/download.html
https://github.com/RSAIntelShare/RID-Server https://github.
http://www.activeresponse.org/the-diamond-model/
http://www.cpni.gov.uk/advice/cyber/Threat-Intelligence/ ...
https://www.illumio.com/resources#download-access
http://www.amazon.com/Cloud-Security-Ecosystem-Technical-Management-ebook/dp/B00ZC90H02/ref=mt_kindle?_encoding=UTF8&me= http://www.
http://www.northropgrumman.com/capabilities/cybersecurity/Pages/default.
http://wenku.baidu.com/link?url=KW6LtX6bN_2-N9ZlNZNmTtmv6Piht_1_2E7ID4tFqo3Yk9hcEr3XkSasBuLxOt...
http://cyber.lockheedmartin.com/blog/introduce-intelligence-to-your-security-operations ...
http://researchcenter.paloaltonetworks.com/2015/10/adversaries-and-their-motivations-part-1/ ...
http://www.hansight.com/dataviewer.html