Even Hackers Deserve Usability : An Expert Evaluation of Penetration Testing Tools
暂无分享,去创建一个
[1] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[2] Andrew Sears,et al. Heuristic Walkthroughs: Finding the Problems Without the Noise , 1997, Int. J. Hum. Comput. Interact..
[3] James P. McDermott,et al. Attack net penetration testing , 2001, NSPW '00.
[4] Kim J. Vicente,et al. Ecological interface design and computer network management: The effects of network size and fault frequency , 2005, Int. J. Hum. Comput. Stud..
[5] Eben M. Haber,et al. Design guidelines for system administration tools developed through ethnographic field studies , 2007, CHIMIT '07.
[6] Robert Biddle,et al. Even Experts Deserve Usable Security: Design guidelines for security management systems , 2007 .
[7] Kirstie Hawkey,et al. Guidelines for designing IT security management tools , 2008, CHiMiT '08.
[8] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[9] Nishant Shrestha. Security Assessment via Penetration Testing: A Network and System Administrator's Approach , 2012 .