Defense in Depth: Foundation for Secure and Resilient IT Enterprises
暂无分享,去创建一个
[1] Kenneth E. Nawyn. A Security Analysis of System Event Logging with Syslog , 2003 .
[2] 杨岩,et al. Windows Server Update Services , 2005 .
[3] Michael G Maihofer,et al. Reinvent the wheel. , 2005, The Journal of the Michigan Dental Association.
[4] K. Fernow. New York , 1896, American Potato Journal.
[5] John Lane,et al. IEEE Standard Computer Dictionary: Compilation of IEEE Standard Computer Glossaries , 1991 .
[6] M. J. Kenning. Security Management Standard — ISO 17799/BS 7799 , 2001 .
[7] Felicia Nicastro. Zero-Day Attack , 2005 .
[8] Wietse Z. Venema,et al. TCP Wrapper: Network Monitoring, Access Control, and Booby Traps , 1992, USENIX Summer.
[9] Julia H. Allen,et al. Outsourcing Managed Security Services , 2003 .
[10] Tobias Oetiker,et al. MRTG: The Multi Router Traffic Grapher , 1998, LISA.
[11] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[12] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[13] G. T. Gangemi,et al. Computer Security Basics , 2006 .
[14] Christopher J. Alberts,et al. Defining Incident Management Processes for CSIRTs: A Work in Progress , 2004 .
[15] Pamela Paulsen,et al. May , 1890, The Hospital.
[16] Harry Newton. Newton's Telecom Dictionary: 22nd Edition (Newton's Telecom Dictionary) (Newton's Telecom Dictionary) , 2006 .
[17] Julia Allen. CERT ®1 System and Network Security Practices i , 2001 .
[18] I. Moosa. Operational risk management , 2007 .
[19] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[20] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[21] Ravi S. Sandhu,et al. Identity management , 2003, IEEE Internet Computing.