{"id":1257,"date":"2006-01-24T00:26:39","date_gmt":"2006-01-23T16:26:39","guid":{"rendered":"http:\/\/ihower.idv.tw\/blog\/archives\/1257"},"modified":"2006-01-28T04:53:37","modified_gmt":"2006-01-27T20:53:37","slug":"%e6%9c%ac%e6%9c%88%e8%b3%bc%e6%9b%b8","status":"publish","type":"post","link":"https:\/\/ihower.tw\/blog\/1257-%e6%9c%ac%e6%9c%88%e8%b3%bc%e6%9b%b8","title":{"rendered":"\u672c\u6708\u5929\u74cf\u8cfc\u66f8"},"content":{"rendered":"<p><font size=\"2\">\u55ef\uff0c\u9019\u500b\u6708\u6709\u9ede\u8d85\u652f\u3002\u96d6\u7136\u5f88\u591a\u8cb7\u4f86\u4e26\u6c92\u6709\u6df1\u5165\u95b1\u8b80\uff0c\u4f46\u4e0d\u6015\u4f60\u7b11\uff0c\u8acb\u770b\u9019\u7bc7<a href=\"http:\/\/ihower.idv.tw\/blog\/archives\/545\">\u8cb7\u4e00\u500b\u9ad8\u624b\u5922<\/a>\uff0c\u4e00\u7a2e\u5922\u5e7b\u822c\u7684\u751f\u6d3b\u65b9\u5f0f&#8230; :p \u54ea\u4e00\u5929\u6709\u7a7a\u96a8\u624b\u7ffb\u7ffb\u4e5f\u53ef\u4ee5\u8b93\u6211\u591a\u53c3\u609f\u5e7e\u9801\u3002<\/font><\/p>\n<ul>\n<li><font size=\"2\">TCP\/IP \u7db2\u8def\u7ba1\u7406 (TCP\/IP Network Administration, 3\/e )<\/font><\/li>\n<li><font size=\"2\">Essential PHP Security<\/font><\/li>\n<li><font size=\"2\">\u7db2\u8def\u5b89\u5168\u5fb9\u5e95\u7814\u7a76 (Network Security: The Complete Reference)<\/font><\/li>\n<li><font size=\"2\">PHP in a Nutshell<\/font><\/li>\n<li><font size=\"2\">Ajax in Action<\/font><\/li>\n<li><font size=\"2\">Mastering FreeBSD and OpenBSD Security<\/font><\/li>\n<li><font size=\"2\">Apache Security<\/font><\/li>\n<li><font size=\"2\">Managing Security with Snort and IDS Tools<\/font><\/li>\n<li><font size=\"2\">Snort Cookbook<\/font><\/li>\n<li><font size=\"2\">\u521d\u63a2\u7db2\u8def\u5b89\u5168 (Network Security first-step)<\/font><\/li>\n<li><font size=\"2\">Sniffer Pro \u7db2\u8def\u6700\u4f73\u5316\u8207\u6545\u969c\u6392\u9664\u624b\u518a<\/font><\/li>\n<li><font size=\"2\">\u8edf\u9ad4\u9810\u5148\u67b6\u69cb\u4e4b\u7f8e\u5b78 (Prefactoring)<\/font><\/li>\n<li><font size=\"2\">Writing Secure Code, 2\/e<\/font><\/li>\n<li><font size=\"2\">Designing Interfaces: Patterns for Effective Interaction Design<\/font><\/li>\n<li><font size=\"2\">Spidering Hacks<\/font><\/li>\n<li><font size=\"2\">Network Security Hacks<\/font><\/li>\n<li><font size=\"2\">BSD Hacks<\/font><\/li>\n<li><font size=\"2\">Web Site Measurement Hacks<\/font><\/li>\n<li><font size=\"2\">Security and Usability<\/font><\/li>\n<li><font size=\"2\">FreeBSD 6 \u67b6\u8a2d\u7ba1\u7406\u8207\u61c9\u7528<\/font><\/li>\n<li><font size=\"2\">DOM Scripting<\/font><\/li>\n<li><font size=\"2\">PHP Hacks<\/font><\/li>\n<li><font size=\"2\">Pro PHP Security<\/font><\/li>\n<li><font size=\"2\">\u5efa\u7acb\u96f6\u7f3a\u9ede\u7684\u5b89\u5168\u8edf\u9ad4\u7cfb\u7d71 (Building Secure Software)<\/font><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u55ef\uff0c\u9019\u500b\u6708\u6709\u9ede\u8d85\u652f\u3002\u96d6\u7136\u5f88\u591a\u8cb7\u4f86\u4e26\u6c92\u6709\u6df1\u5165\u95b1\u8b80\uff0c\u4f46\u4e0d\u6015\u4f60\u7b11\uff0c\u8acb\u770b\u9019\u7bc7\u8cb7\u4e00\u500b\u9ad8\u624b\u5922\uff0c\u4e00\u7a2e\u5922\u5e7b\u822c\u7684\u751f\u6d3b\u65b9\u5f0f&#038;#82 &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ihower.tw\/blog\/1257-%e6%9c%ac%e6%9c%88%e8%b3%bc%e6%9b%b8\" class=\"more-link\">\u95b1\u8b80\u5168\u6587<span class=\"screen-reader-text\">\u3008\u672c\u6708\u5929\u74cf\u8cfc\u66f8\u3009<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9],"tags":[],"class_list":["post-1257","post","type-post","status-publish","format-standard","hentry","category-books","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1q6tG-kh","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/posts\/1257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/comments?post=1257"}],"version-history":[{"count":0,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/posts\/1257\/revisions"}],"wp:attachment":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/media?parent=1257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/categories?post=1257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/tags?post=1257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}