A Representative Management Model of Network Security in Enterprise Informatization
暂无分享,去创建一个
[1] Ian Watson. Portable Storage Devices: Securing portable storage devices , 2006 .
[2] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[3] Joachim Swoboda,et al. Network Management Information Models , 2004 .
[4] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[5] William Stallings,et al. Network Security Essentials , 1999 .
[6] Marwan Al-Akaidi,et al. Architectural framework for wireless mobile ad hoc networks (AF WMANETs) , 2006, Comput. Commun..
[7] Richard Williams. Performing a Successful Unix Audit , 2003 .
[8] John Sherwood,et al. Managing security for outsourcing contracts , 1997, Comput. Secur..
[9] Clive Blatchford. Information systems security and the multinational enterprise (2) , 1996 .
[10] Clive Blatchford. Information systems security and the multinational enterprise (1) , 1996 .
[11] Joël Favrel,et al. Collaborative business and data privacy: Toward a cyber-control? , 2005, Comput. Ind..
[12] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..