August 2015 B: safe, practical programmer
Published in08:09 2015-08-17|
August black hat conference has just ended, the latest hacking technology to hit the security boundary, the car is no longer an invasion of the movie plot. With the security crisis escalated, "security" in China also faces delicate situation, enterprise sales oriented, relatively safe edge, security personnel in the state of loss; at the same time, the safety awareness of enterprises gradually on the rise, slowly for their own built security fences.
To this end, we planned the "safety and practice" of the cover topics. On the one hand, we from a macro perspective, on Chinese security industry status and trends were observed for overall (see "safety of the noise and commotion"); more on the market for talent in today's security to bring the latest analytical (see "network security personnel decided the industry pattern).
Also in technical practice, we invite Safety & Security Manager Fu Shanyang in their own rich experience summed up "six kinds of common architecture design of security errors"; and to where safety director Guo Tiansen, only product senior engineer run Hui Wang, as we summarize in today's Internet companies in the construction safety ofrealPractical experience. At the same time, mobile security is an issue that must be covered, this part of us from bypass attacks to see the 4G era of mobile security".
Behind the high speed development, the network security boundary is being widened and increasingly complex. We can see that the traditional fixed boundary in the new information attack and defense in the form of increasingly ineffective, construction of the new design for failure, the attack surface control, defense in depth, real-time security intelligence perception security system began to emerge, more enterprise security practices have "from" 0 "to" 1 ".
Finally, in addition to the wonderful safety topics, Xiaobian especially recommended with Google x laboratory experience in R & D of Gu Zhiqiang, bring the "magic of distance geometry", from a technical point of view analysis of ultrasonic, Bluetooth, Wi Fi, ultra wideband positioning network application in the pros and cons. Well, we also invited Zhong Wenchang to visit the United States to share the experience of the black hat conference. Zhong Wenchang being a hacker's perspective, lead us hacking into the real world, including how he became a hacker, and hackers and how to treat their own identity (see "hacker conference my story"). I believe that this issue will bring readers a wealth of experience.
(1) the sound and the agitation of safety
The practice and exploration of enterprise private cloud security protection (3)
(4) where the network security practices: how to build enterprise information security from 0 to 1
(5) the only product safety practice three steps
(6) from the bypass attack to see the 4G era of mobile security
(7) network security professionals to determine the pattern of the industry
(8) ROVNIX attack platform analysis
(1) foreign express: CACM
(2): IEEE SPECTRUM express foreign periodicals
(3) how to make effective communication with the team
(4) the harm of information isolated island to QA
(5) how to product manager for burden
(6) the sound of the industry
(2) 2.0- Use-Case software development center
(3) the magic of distance geometry
Programmers 2015 electronic version of the subscription hot, including: iPad version, Android version, PDF version.
- Online consulting (QQ): 2251809102
- Telephone consultation: 010-64351436
- Email address: reader@PROG3.COM
- More news, welcome to joinProgrammers editorial department
This article CSDN original article, shall not be reproduced without permission, for reprint please contact market#PROG3.COM (@ # replaced)
- step on
- Related articles
- Latest report
- Interview with Tencent security expert Lu Zhaohua: a comprehensive analysis of Tencent mobile payment security protection network
- Create a safe community culture of the Hippocratic Oath geek spring has come!
- The great rise of safety products made in china"
- "Programmer" in 2014 8 monthly: security new knowledge
- Security housekeeper Zhao Gang: security vendors to make money is not easy to move to the platform to enter the security
- Symantec in Beijing to preview the latest mobile security technology SMRS prototype
- 2015 China big data technology conference
In order to better help enterprises in-depth understanding of large data with the latest technology at home and abroad, master more industry data of practical experience, to further promote the big data technology innovation, industry application and talent cultivation, 10-12 December 2015, sponsored by the China Computer Federation (CCF), CO CCF large numbers according to the Expert Committee of the contractor, Chinese Academy of Sciences Institute of computing technology, and DNT branch in Beijing Science and Technology Co., Ltd. and CSDN 2015 China big data technology conference (big data technology conference 2015, BDTC 2015) will Yunnan new crown holiday hotel in Beijing held a grand.
Related popular articles