The InfoSec Handbook
暂无分享,去创建一个
[1] C. Breen,et al. Signaling systems for control of telephone switching , 1960 .
[2] THE GREAT WAR THAT ALMOST WAS: CRIMEA, 1853-1856 , 1973, The US Army War College Quarterly: Parameters.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Donn B. Parker,et al. Fighting computer crime , 1983 .
[5] Tim Berners-Lee. The World-Wide Web Initiative , 1992 .
[6] Janet Ellen Abbate. From ARPANET to Internet: A history of ARPA -sponsored computer networks, 1966--1988 , 1994 .
[7] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[8] Richard Brackney. Cyber-intrusion response , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[9] Louis Kruh,et al. THE COMMERCIAL ENIGMA: BEGINNINGS OF MACHINE CRYPTOGRAPHY , 2002, Cryptologia.
[10] Elisabeth Rakus-Andersson. The Brains behind the Enigma Code Breaking before the Second World War , 2003 .
[11] Christopher J. Coyne,et al. THE ECONOMICS OF COMPUTER HACKING , 2005 .
[12] Kristi Short,et al. An Examination of the Components and Mathematics of the Enigma Electromechanical Rotor Ciphers , 2007 .
[13] Michael A. Simon,et al. Biometrics For Dummies , 2008 .
[14] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[15] Tim Berners-Lee,et al. World-Wide Web: The Information Universe , 1992, Electron. Netw. Res. Appl. Policy.
[16] F. J. Corbat. INTRODUCTION AND OVERVIEW OF THE MULTICS SYSTEM , 2010 .
[17] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .