Space and Cyber Security
暂无分享,去创建一个
Dario Sgobbi | Michelangelo L’Abbate | Daniele Frasca | Vittoria Piantelli | Giorgio Sciascia | M. L'Abbate | D. Frasca | Dario Sgobbi | Vittoria Piantelli | Giorgio Sciascia
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] JOSEPH ZILBER,et al. issue 1 , 2020, JORDANIAN JOURNAL OF ENGINEERING AND CHEMICAL INDUSTRIES (JJECI).
[3] Stuart Jacobs,et al. Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance , 2015 .
[4] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[5] Jan Trobitius,et al. Anwendung der "Common Criteria for Information Technology Security Evaluation" (CC) / ISO 15408 auf ein SOA Registry-Repository , 2007, Informatiktage.
[6] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティ管理策の実践のための規範 : ISO/IEC 27002 = Information technology-Security techniques-Code of practice for information security controls : ISO/IEC 27002 , 2013 .
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] James R. Wertz,et al. Space Mission Analysis and Design , 1992 .
[9] Bob Lightsey,et al. Systems Engineering Fundamentals , 2001 .