Security threats to Internet: a Korean multi-industry investigation
暂无分享,去创建一个
Ingoo Han | Sangjae Lee | Bumsuk Jung | Ingoo Han | Sangjae Lee | B. Jung
[1] Lance J. Hoffman,et al. A survey of issues in computer network security , 1986, Comput. Secur..
[2] Steve Webb. Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age , 2000, Comput. Secur..
[3] Houston H. Carr,et al. Risk Analysis for Information Technology , 1991, J. Manag. Inf. Syst..
[4] Gerald L. Kovacich,et al. Internet Targets , 2000, Comput. Secur..
[5] M. Smith. Computer security-threats, vulnerabilities and countermeasures , 1989 .
[6] A. Lyman Chapin,et al. Open Systems Networking: Tcp/Ip and Osi , 1993 .
[7] Lawrence K. Cooper,et al. Is Electronic Commerce Ready for the Internet? A Case Study of a Financial Services Provider , 1996, Inf. Syst. Manag..
[8] Aime J. Bayle. Security in open system networks: A tutorial survey , 1988 .
[9] D. Parker. Computer Security Management , 1981 .
[10] Günther Pernul,et al. Information systems security: Scope, state-of-the-art, and evaluation of techniques , 1995 .
[11] Edward L. Witzke,et al. A security methodology for computer networks , 1988, AT&T Technical Journal.
[12] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[13] John Braun,et al. Internet security , 2001 .
[14] Steven Furnell,et al. Computer hacking and cyber terrorism: the real threats in the new millennium? , 1999, Comput. Secur..
[15] Amarnath Prakash. The Internet as a Global Strategic IS Tool , 1996, Inf. Syst. Manag..
[16] Monica J. Garfield,et al. Planning for Internet Security , 1997, Inf. Syst. Manag..
[17] Sead Muftic. Security Mechanisms for Computer Networks , 1988, Comput. Networks.
[18] Charles P. Pfleeger,et al. Security in computing , 1988 .
[19] Joyce K. Reynolds,et al. Site Security Handbook , 1991, RFC.