導(dǎo)語:下面是小編收集整理的一些關(guān)于計(jì)算機(jī)專業(yè)畢業(yè)論文的參考文獻(xiàn),歡迎大家閱讀借鑒!
計(jì)算機(jī)專業(yè)畢業(yè)論文參考文獻(xiàn)
[1] 馮登國. 計(jì)算機(jī)通信網(wǎng)絡(luò)安全. 北京:清華大學(xué)出版社, 2001
[2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN
0-201-10150-5.
[3] M. Bishop and D. Bailey, “A Critical Analysis of Vulnerability Taxonomies”,
Technical Report CSE-96-11, Dept. of Computer Science, University of California at
Davis, Davis, CA 95616-8562 (Sep. 1996).
[4] 微軟安全中心.
https://www.microsoft.com/china/technet/security/default.mspx
[5] FrSIRT. https://www.frsirt.com/english/index.php
[6] 國際CVE標(biāo)準(zhǔn). https://www.cve.mitre.org
[7] Mitre Corporation. Common Vulnerabilities and Exposures. Available from
https://cve.mitre.org/ , accessed 2003.
[8] Wenliang Du,Aditya P. Mathur. Vulnerability Testing of Software System Using
Fault Injection.Coast TR 98-02, 1998.
[9] CVSS. https://www.first.org/cvss/.
[10] Matt Blaze. 2002 September 15 (Preprint, revised 2003 March 02). Cryptology
and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. IEEE
Security and Privacy (March/April 2003).
[11] Steven M. Christey and Chris Wysopal. 2002 February 12 (Expired 2002 August
12). Responsible Vulnerability Disclosure Process (Internet-Draft RFC).
[12] Computer Emergency Response Team/Coordination Center. 2000 October 09.
CERT/CC Vulnerability Disclosure Policy.
[13] Computer Emergency Response Team/Coordination Center. 2003. CERT/CC
Vulnerability Metric.
[14] Russ Cooper. 2001. Proposal – The Responsible Disclosure Forum.
[15] Dennis Fisher. 2003 November 18. “Security Researcher Calls for Vulnerability
Trade Association.” eWeek.
[16] Daniel E. Geer, Jr. (Editor), Dennis Devlin, Jim Duncan, Jeffrey Schiller, and Jane
Winn. 2002 Third Quarter. “Vulnerability Disclosure.” Secure Business Quarterly.
[17] Daniel E. Geer, Jr. (Editor), Mary Ann Davidson, Marc Donner, Lynda McGhie,
and Adam Shostack. 2003 Second Quarter. “Patch Management.” Secure Business Quarterly.
[18] Tiina Havana. 2003 April. Communication in the Software Vulnerability
Reporting Process. M.A. thesis, University of Jyvaskyla.
[19] Internet Security Systems. 2002 November 18 (Revised). X-Force™ Vulnerability
Disclosure Guidelines.
[20] Elias Levy. 2001 October 21. “Security in an Open Electronic Society.”
SecurityFocus.
[21] Microsoft Corporation. 2002 November (Revised). Microsoft Security Response
Center Security Bulletin Severity Rating System.
[22] Marcus Ranum. 2000 October. “The Network Police Blotter – Full Disclosure is
Bogus.” ;login:The Magazine of USENIX & SAGE. Volume 25, no. 6: 47-49.
[23] Krsul V.Software Vulnerability Analysis.Department of Computer Sciences,
Purdue University, 1998
[24] @Stake. 2002 June 05. Security Vulnerability Reporting Policy. Available from
https://www.atstake.com/research/policy/ , accessed 2003.
[25] William A. Arbaugh, William L. Fithen, and John McHugh. 2000 December.
Windows of Vulnerability: A Case Study Analysis. IEEE Computer.
[26] Ross Anderson. 2001. Security Engineering: A Guide to Building Dependable
Distributed Systems. John Wiley & Sons. ISBN: 0-471-38922-6.
[27] Matt Bishop. 2003. Computer Security: Art and Science. Addison-Wesley
Professional. ISBN: 0-201-44099-7.
[28] Matt Bishop. 1999 September. Vulnerabilities Analysis. Proceedings of the
Second International Symposium on Recent Advances in Intrusion Detection.
[29] 單國棟, 戴英俠, 王航. 計(jì)算機(jī)漏洞分類研究. 計(jì)算機(jī)工程,2002,28(10):3-6
[30] 夏云慶 編著 Visual C++ 6.0 數(shù)據(jù)庫高級編程 北京希望電子出版社
[31] 段鋼 編著 加密與解密(第二版) 電子工業(yè)出版社
[33] 候俊杰 著 深入淺出MFC 第2 版 華中科技大學(xué)出版社
[34] Applied Microsoft.NET Framework Programming (美) Jeffrey Richter 著 清華
大學(xué)出版社
[35] National Vulnerability Database https://nvd.nist.gov
[36] US-CERT Vulnerability Notes. https://www.kb.cert.org/vuls
[37] SecurityFocus. https://www.securityfocus.com
[38] Internet Security Systems – X-Force Database.
[39] 孫鳳宏. 探索未來計(jì)算機(jī)技術(shù)發(fā)展與應(yīng)用[J]. 青海統(tǒng)計(jì), 2007,(11) .
[40] 蔡芝蔚. 計(jì)算機(jī)技術(shù)發(fā)展研究[J]. 電腦與電信, 2008,(02) .
[41] 文德春. 計(jì)算機(jī)技術(shù)發(fā)展趨勢[J]. 科協(xié)論壇(下半月), 2007,(05) .
[42] 姚正. 計(jì)算機(jī)發(fā)展趨勢展望[J]. 商情(教育經(jīng)濟(jì)研究), 2008,(01) .
[43]《計(jì)算機(jī)研究與發(fā)展》簡介[J]. 計(jì)算機(jī)研究與發(fā)展, 2008,(01) .
[44] 許封元. 計(jì)算機(jī)發(fā)展趨勢[J]. 農(nóng)業(yè)網(wǎng)絡(luò)信息, 2006,(08) .
[45] 陳相吉. 未來計(jì)算機(jī)與計(jì)算機(jī)技術(shù)的發(fā)展[J]. 法制與社會(huì), 2007,(10) .
[46] 何文瑤. 計(jì)算機(jī)技術(shù)發(fā)展態(tài)勢分析[J]. 科技創(chuàng)業(yè)月刊, 2007,(05) .