Users are not the enemy
暂无分享,去创建一个
[1] J. G. Hollands,et al. Engineering Psychology and Human Performance , 1984 .
[2] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[3] Kai Sorensen,et al. Federal Information Processing Standards Publication , 1985 .
[4] A. M. De Alvare,et al. How crackers crack passwords or what passwords to avoid , 1988 .
[5] C. Wickens. Engineering psychology and human performance, 2nd ed. , 1992 .
[6] Donn B. Parker,et al. Restating the Foundation of Information Security , 1991, SEC.
[7] Pamela Jordan. Basics of qualitative research: Grounded theory procedures and techniques , 1994 .
[8] Warwick Ford,et al. Computer communication security - principles, standard protocols and techniques , 2008 .
[9] Jean Hitchings,et al. Deficiencies of the traditional approach to information security and the requirements for a new methodology , 1995, Comput. Secur..