http://www.amazon.cn/Advanced-Persistent-Threat-Hacking-The-Art-and-Science-of-Hacking-Any-Organization-Wrightson-Tyler/dp/0071828362/ref=sr_1_2?ie=UTF8&qid=1410155072&sr=8-2&keywords=Advanced+Persistent+Threat
http://www.amazon.com/s/ref=nb_sb_noss_1?url=node%3D377560011&field-keywords=big+data+security&rh=n%3A283155%2Cn%3A!1000%2Cn%3A5%2Cn%3A377560011%2Ck%3Abig+data+security
1、 Automated Firewall Analytics: Design, Configuration and Optimization
http://www.amazon.com/Automated-Firewall-Analytics-Configuration-Optimization/dp/3319103709/ref=sr_1_96?s=books&ie=UTF8&qid=1409992955&sr=1-96
2、Designing and Building Security Operations Center
http://www.amazon.com/Automated-Firewall-Analytics-Configuration-Optimization/dp/3319103709/ref=sr_1_96?s=books&ie=UTF8&qid=1409992955&sr=1-96
3、The Chief Information Security Officer: Roles and Responsibilities
http://www.amazon.com/Chief-Information-Security-Officer-Responsibilities/dp/1466517891/ref=sr_1_121?s=books&ie=UTF8&qid=1409993132&sr=1-121
4、CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security
http://www.amazon.com/CSA-Guide-Cloud-Computing-Implementing/dp/0124201253/ref=sr_1_130?s=books&ie=UTF8&qid=1409993132&sr=1-130
5、PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance
http://www.amazon.com/PCI-Compliance-Fourth-Understand-Implement/dp/0128015799/ref=sr_1_129?s=books&ie=UTF8&qid=1409993132&sr=1-129
6、Information Security Analytics: Finding Security Insights, Patterns and Anomalies in Big Data
http://www.amazon.com/Information-Security-Analytics-Insights-Anomalies/dp/0128002077/ref=sr_1_140?s=books&ie=UTF8&qid=1409993182&sr=1-140
7、Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362/ref=sr_1_159?s=books&ie=UTF8&qid=1409993296&sr=1-159
8、Cyber Security Management: A Governance, Risk and Compliance Framework
http://www.amazon.com/Cyber-Security-Management-Governance-Compliance/dp/1472432096/ref=sr_1_157?s=books&ie=UTF8&qid=1409993296&sr=1-157
9、Integrated Security Systems Design, Second Edition: A Complete Reference for Building Enterprise-Wide Digital Security Systems
http://www.amazon.com/Integrated-Security-Systems-Design-Second/dp/0128000228/ref=sr_1_166?s=books&ie=UTF8&qid=1409993296&sr=1-166
10、Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats
http://www.amazon.com/Building-Information-Security-Awareness-Program/dp/0124199674/ref=sr_1_189?s=books&ie=UTF8&qid=1409993431&sr=1-189
11、Security Architect: Careers in Information Security (BCS Guides to it Roles)
http://www.amazon.com/Security-Architect-Careers-Information-Guides/dp/1780172206/ref=sr_1_186?s=books&ie=UTF8&qid=1409993431&sr=1-186
12、Kali Linux CTF Blueprints
http://www.amazon.com/Kali-Linux-Blueprints-Cameron-Buchanan/dp/1783985984/ref=sr_1_203?s=books&ie=UTF8&qid=1409993494&sr=1-203
13、Secure Data Provenance and Inference Control with Semantic Web
http://www.amazon.com/Secure-Provenance-Inference-Control-Semantic/dp/1466569433/ref=sr_1_228?s=books&ie=UTF8&qid=1409993546&sr=1-228