Subscription programmers magazine RSS CSDN home> Programmers magazine

August 2015 B: safe, practical programmer

Published in08:09 2015-08-17| Time reading| sourceProgrammers magazine| ZeroArticle comments| authorProgrammers magazine

Abstract:Border security is infinite expanding and increasingly complex, the traditional fixed boundary in the new information attack and defense in the form of increasingly ineffective, the construction of the new design for failure, the attack surface control, defense in depth, real-time security intelligence perception security system began to emerge, more enterprise security practices have "from" 0 "to" 1 ".

August black hat conference has just ended, the latest hacking technology to hit the security boundary, the car is no longer an invasion of the movie plot. With the security crisis escalated, "security" in China also faces delicate situation, enterprise sales oriented, relatively safe edge, security personnel in the state of loss; at the same time, the safety awareness of enterprises gradually on the rise, slowly for their own built security fences.

To this end, we planned the "safety and practice" of the cover topics. On the one hand, we from a macro perspective, on Chinese security industry status and trends were observed for overall (see "safety of the noise and commotion"); more on the market for talent in today's security to bring the latest analytical (see "network security personnel decided the industry pattern).

Also in technical practice, we invite Safety & Security Manager Fu Shanyang in their own rich experience summed up "six kinds of common architecture design of security errors"; and to where safety director Guo Tiansen, only product senior engineer run Hui Wang, as we summarize in today's Internet companies in the construction safety ofrealPractical experience. At the same time, mobile security is an issue that must be covered, this part of us from bypass attacks to see the 4G era of mobile security".

Behind the high speed development, the network security boundary is being widened and increasingly complex. We can see that the traditional fixed boundary in the new information attack and defense in the form of increasingly ineffective, construction of the new design for failure, the attack surface control, defense in depth, real-time security intelligence perception security system began to emerge, more enterprise security practices have "from" 0 "to" 1 ".

Finally, in addition to the wonderful safety topics, Xiaobian especially recommended with Google x laboratory experience in R & D of Gu Zhiqiang, bring the "magic of distance geometry", from a technical point of view analysis of ultrasonic, Bluetooth, Wi Fi, ultra wideband positioning network application in the pros and cons. Well, we also invited Zhong Wenchang to visit the United States to share the experience of the black hat conference. Zhong Wenchang being a hacker's perspective, lead us hacking into the real world, including how he became a hacker, and hackers and how to treat their own identity (see "hacker conference my story"). I believe that this issue will bring readers a wealth of experience.


Cover report

(1) the sound and the agitation of safety

(2)6 common architecture design security errors

The practice and exploration of enterprise private cloud security protection (3)

(4) where the network security practices: how to build enterprise information security from 0 to 1

(5) the only product safety practice three steps

(6) from the bypass attack to see the 4G era of mobile security

(7) network security professionals to determine the pattern of the industry

(8) ROVNIX attack platform analysis

information

(1) foreign express: CACM

(2): IEEE SPECTRUM express foreign periodicals

(3) how to make effective communication with the team

(4) the harm of information isolated island to QA

(5) how to product manager for burden

(6) the sound of the industry

(7)My story of the hacker Conference

technology

(1)Discussion on the structure and performance of CloudStack and ZStack

(2) 2.0- Use-Case software development center

(3) the magic of distance geometry

Subway

(1)How much influence do you have on your salary

Programmers 2015 electronic version of the subscription hot, including: iPad version, Android version, PDF version.

Subscription advisory:

top
Zero
step on
Zero

Recent activity

more

2015 China big data technology conference

In order to better help enterprises in-depth understanding of large data with the latest technology at home and abroad, master more industry data of practical experience, to further promote the big data technology innovation, industry application and talent cultivation, 10-12 December 2015, sponsored by the China Computer Federation (CCF), CO CCF large numbers according to the Expert Committee of the contractor, Chinese Academy of Sciences Institute of computing technology, and DNT branch in Beijing Science and Technology Co., Ltd. and CSDN 2015 China big data technology conference (big data technology conference 2015, BDTC 2015) will Yunnan new crown holiday hotel in Beijing held a grand.

Microblogging attention

Programmer mobile terminal subscription Download

Related popular articles