Aspects of computer security: A primer
暂无分享,去创建一个
[1] Bernard P. Zajac,et al. Pretty good privacy , 1994 .
[2] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[3] Rob Havelt. System Administration: SATAN: Analyzing Your Network , 1997 .
[4] Christine Meierhöfer. Pretty good privacy , 1996, SIGGRAPH '96.
[5] M G Strintzis,et al. Network and data security design for telemedicine applications. , 1997, Medical informatics = Medecine et informatique.
[6] Kevin Fenzi. Tripping Up Intruders with Tripwire , 1997 .
[7] C Willenberg. [Strategy for securing medical documents by electronic signature and encryption]. , 1997, Der Radiologe.
[8] Joseph Berry. Assessing CPU utilization , 1998 .
[9] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[10] Paul Wouters. Designing a Safe Network Using Firewalls , 1997 .
[11] Syed Ali. Freeware-based security , 1999 .
[12] Shireesh Reddy Annam. An Overview of Computer security , 2001, ArXiv.
[13] L. Chan-Lizardo,et al. Virtual private networks , 1988 .
[14] William Stallings. Network and Internetwork Security: Principles and Practice , 1994 .
[15] C. Willenberg,et al. Strategies for the security of medical documents. Electronic signature and encryption , 1997, Der Radiologe.
[16] Stephen T. C. Wong,et al. Security for the digital information age of medicine: Issues, applications, and implementation , 1997, Journal of Digital Imaging.
[17] Robert Owen Thomas. Haunted by the ghost of smurfing , 1998 .
[18] Lee Brotzman. Wrap A Security Blanket Around Your Computer , 1997 .
[19] Rita C. Summers. An Overview of Computer Security , 1984, IBM Syst. J..
[20] Thomas Simpson,et al. Who Is At the Door , 1997 .
[21] Bear Giles. Encrypted File Systems , 1998 .