A taxonomy for information security technologies
暂无分享,去创建一个
[1] Susan Conway,et al. Unlocking Knowledge Assets , 2002 .
[2] Jan Killmeyer,et al. Information Security Architecture , 2000 .
[3] Kathryn Walker,et al. Computer security policies and SunScreen firewalls , 1998 .
[4] Eric Cole,et al. Hackers Beware: Defending Your Network from the Wiley Hacker , 2001 .
[5] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[6] Vijay K. Gurbani,et al. Internet TCP/IP Network Security: Securing Protocols and Applications , 1996 .
[7] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[8] Eric Maiwald,et al. Security Planning & Disaster Recovery , 2002 .
[9] Eric Maiwald,et al. Security Planning and Disaster Recovery , 2002 .
[10] Charles P. Pfleeger,et al. Security in computing , 1988 .
[11] Isij Monitor,et al. Network Intrusion Detection: An Analyst’s Handbook , 2000 .
[12] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[13] Michael Huth. Secure communicating systems - design, analysis, and implementation , 2001 .
[14] George Kurtz,et al. Hacking Exposed , 2005 .