├── ISC-大数据技术助力金融业务安全-20180822-1(中行-徐雷鸣)分享.pdf ├── LTE网络环境下的业务安全保障体系-何文杰.pdf ├── PM03-卢明樊-爱奇艺业务安全风控体系的建设实践.pdf ├── README.md ├── 《互联网业务的风险控制》岂安科技 罗启武 061118.pdf ├── 《互联网业务面临问题浅谈和安全创新实践》 - 阿里聚安全 方超.pdf ├── 《黑无止境之业务逻辑“漏洞”》知道创宇云安全 锅涛.pdf ├── 丁安安_业务安全与反欺诈-全链路治理V3-脱敏.pdf ├── 不可忽视的业务安全问题-唯品会.pdf ├── 与业务融合的漏洞检测之路-猪猪侠-20150112.pdf ├── 业务安全.jpg ├── 业务安全1.jpg ├── 业务安全应急响应新思考-韩晋.pdf ├── 互联网业务安全-趋势、挑战与应对-磨铁.pdf ├── 企业业务安全开发实践.pdf ├── 使用流量分析解决业务安全问题-李昌志.pdf ├── 基于业务 构筑安全-兰云科技.pdf ├── 威胁情报的业务安全应用价值(可公开).pdf ├── 李广林_企业业务安全建设经验分享-0816.pdf ├── 芯盾时代孙悦:数字身份的最佳实践,以人为核心的业务安全.pdf └── 议题三 当威胁情报遇上业务安全.pptx /ISC-大数据技术助力金融业务安全-20180822-1(中行-徐雷鸣)分享.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/ISC-大数据技术助力金融业务安全-20180822-1(中行-徐雷鸣)分享.pdf -------------------------------------------------------------------------------- /LTE网络环境下的业务安全保障体系-何文杰.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/LTE网络环境下的业务安全保障体系-何文杰.pdf -------------------------------------------------------------------------------- /PM03-卢明樊-爱奇艺业务安全风控体系的建设实践.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/PM03-卢明樊-爱奇艺业务安全风控体系的建设实践.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Operational-Security 2 | 各安全大会业务安全资料 3 | -------------------------------------------------------------------------------- /《互联网业务的风险控制》岂安科技 罗启武 061118.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/《互联网业务的风险控制》岂安科技 罗启武 061118.pdf -------------------------------------------------------------------------------- /《互联网业务面临问题浅谈和安全创新实践》 - 阿里聚安全 方超.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/《互联网业务面临问题浅谈和安全创新实践》 - 阿里聚安全 方超.pdf -------------------------------------------------------------------------------- /《黑无止境之业务逻辑“漏洞”》知道创宇云安全 锅涛.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/《黑无止境之业务逻辑“漏洞”》知道创宇云安全 锅涛.pdf -------------------------------------------------------------------------------- /丁安安_业务安全与反欺诈-全链路治理V3-脱敏.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/丁安安_业务安全与反欺诈-全链路治理V3-脱敏.pdf -------------------------------------------------------------------------------- /不可忽视的业务安全问题-唯品会.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/不可忽视的业务安全问题-唯品会.pdf -------------------------------------------------------------------------------- /与业务融合的漏洞检测之路-猪猪侠-20150112.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/与业务融合的漏洞检测之路-猪猪侠-20150112.pdf -------------------------------------------------------------------------------- /业务安全.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/业务安全.jpg -------------------------------------------------------------------------------- /业务安全1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/业务安全1.jpg -------------------------------------------------------------------------------- /业务安全应急响应新思考-韩晋.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/业务安全应急响应新思考-韩晋.pdf -------------------------------------------------------------------------------- /互联网业务安全-趋势、挑战与应对-磨铁.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/互联网业务安全-趋势、挑战与应对-磨铁.pdf -------------------------------------------------------------------------------- /企业业务安全开发实践.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/企业业务安全开发实践.pdf -------------------------------------------------------------------------------- /使用流量分析解决业务安全问题-李昌志.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/使用流量分析解决业务安全问题-李昌志.pdf -------------------------------------------------------------------------------- /基于业务 构筑安全-兰云科技.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/基于业务 构筑安全-兰云科技.pdf -------------------------------------------------------------------------------- /威胁情报的业务安全应用价值(可公开).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/威胁情报的业务安全应用价值(可公开).pdf -------------------------------------------------------------------------------- /李广林_企业业务安全建设经验分享-0816.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/李广林_企业业务安全建设经验分享-0816.pdf -------------------------------------------------------------------------------- /芯盾时代孙悦:数字身份的最佳实践,以人为核心的业务安全.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/芯盾时代孙悦:数字身份的最佳实践,以人为核心的业务安全.pdf -------------------------------------------------------------------------------- /议题三 当威胁情报遇上业务安全.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tkid3/Operational-Security/52cc080c9576a9c31c3736e7185820be65675347/议题三 当威胁情报遇上业务安全.pptx --------------------------------------------------------------------------------