{"id":105113,"date":"2024-10-02T14:38:10","date_gmt":"2024-10-02T06:38:10","guid":{"rendered":"https:\/\/lrxjmw.cn\/?p=105113"},"modified":"2024-10-02T14:38:10","modified_gmt":"2024-10-02T06:38:10","slug":"hacking-the-next-generation","status":"publish","type":"post","link":"https:\/\/lrxjmw.cn\/hacking-the-next-generation.html","title":{"rendered":"\u300aHacking\uff1aThe.Next.Generation\u300bpdf\u7535\u5b50\u4e66\u514d\u8d39\u4e0b\u8f7d"},"content":{"rendered":"

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defendin<\/p>\n

Nitesh Dhanjani is a well known security researcher, author, and speaker. Dhanjani is currently Senior Manager at a large consulting firm where he advises some of the largest corporations around the world on how to establish enterprise wide information se<\/p>\n

\"\"<\/p>\n


\n

\u6839\u636e\u4e2d\u534e\u4eba\u6c11\u5171\u548c\u56fd\u56fd\u5bb6\u7248\u6743\u5c40\u76f8\u5173\u6cd5\u89c4\uff0c\u672c\u7ad9\u4e0d\u63d0\u4f9b\u8be5PDF\u7535\u5b50\u7248\u4e66\u7c4d
\n\u60a8\u53ef\u4ee5\u8fdb\u5165\u4ea4\u6d41\u793e\u7fa4\u4e2d\u7ee7\u7eed\u5bfb\u627e\u8d44\u6599\u6216\u8d2d\u4e70\u6b63\u7248\u4e66\u7c4d<\/p>\n

\"Linux\u4ea4\u6d41\u7fa4\" <\/a><\/p>\n

\u6280\u672f\u4ea4\u6d41\u793e\u7fa4\uff1ahttps:\/\/lrxjmw.cn\/club<\/a><\/p>\n

Linux\u4e66\u7c4d\u5728\u7ebf\u9605\u8bfb\uff1ahttps:\/\/lrxjmw.cn\/chapter-00.html<\/a><\/p>\n

\n<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

With the advent of rich Internet applications, the expl […]<\/p>\n","protected":false},"author":1,"featured_media":105117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[430],"tags":[],"class_list":["post-105113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-books"],"acf":[],"_links":{"self":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts\/105113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/comments?post=105113"}],"version-history":[{"count":2,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts\/105113\/revisions"}],"predecessor-version":[{"id":154760,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/posts\/105113\/revisions\/154760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/media\/105117"}],"wp:attachment":[{"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/media?parent=105113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/categories?post=105113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lrxjmw.cn\/wp-json\/wp\/v2\/tags?post=105113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}