Stalking the wily hacker
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Inference Controls for Statistical Databases , 1983, Computer.
[2] David F. Stevens. Who Goes There? A Dialogue of Questions and Answers About Benign Hacking , 1987, Int. CMG Conference.
[3] Ian H. Witten,et al. Computer in(security): infiltrating open systems , 1987 .
[4] S. Landau. ZERO KNOWLEDGE AND THE DEPARTMENT OF DEFENSE , 1988 .
[5] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[6] Brian Reid,et al. Reflections on some recent widespread computer break-ins , 1991 .
[7] F. T. Grampp,et al. The UNIX system UNIX operating system security , 1984, AT&T Bell Laboratories Technical Journal.
[8] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[9] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[10] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[11] Stephen G. Kochan,et al. Unix System Security , 1986 .
[12] Carl E. Landwehr. The Best Available Technologies for Computer Security , 1983, Computer.