- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 66字
- 2021-06-10 18:42:36
Other sources for security requirements
Security non-functional requirements can come from many sources. For the IoT, spend time reviewing many of the best practice guidance documents that have been published over the past few years. These include documents from organizations such as the Cloud Security Alliance (CSA), ENISA, the Industrial Internet Consortium (IIC), the Underwriters Laboratory (2900 series), and the IoT Security Foundation (IoTSF).
推薦閱讀
- 計算機網絡安全技術(第6版·慕課版)
- Python Penetration Testing Cookbook
- CTF競賽權威指南(Pwn篇)
- 從0到1:CTFer成長之路
- API安全技術與實戰
- 網絡安全大數據分析與實戰
- 華為Anti-DDoS技術漫談
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- Hands-On Bug Hunting for Penetration Testers
- 大中型網絡入侵要案直擊與防御
- 計算機病毒揭秘與對抗
- 黑客與安全技術指南
- Learning Metasploit Exploitation and Development
- Hands-On Application Penetration Testing with Burp Suite
- 隱私保護計算