Enforcing network security: a real cease study in a research organization
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[3] Dan Farmer,et al. Improving the Security of Your Site by Breaking Into it , 2000 .
[4] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[5] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[6] Mike Loukides,et al. Managing NFS and NIS , 1991 .