精品国产一级毛片大全,毛片一级在线,毛片免费观看的视频在线,午夜毛片福利

2016計(jì)算機(jī)專業(yè)論文參考文獻(xiàn)

  導(dǎo)語:下面是小編收集整理的一些關(guān)于計(jì)算機(jī)專業(yè)畢業(yè)論文的參考文獻(xiàn),歡迎大家閱讀借鑒!

  計(jì)算機(jī)專業(yè)畢業(yè)論文參考文獻(xiàn)

  [1] 馮登國. 計(jì)算機(jī)通信網(wǎng)絡(luò)安全. 北京:清華大學(xué)出版社, 2001

  [2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN

  0-201-10150-5.

  [3] M. Bishop and D. Bailey, “A Critical Analysis of Vulnerability Taxonomies”,

  Technical Report CSE-96-11, Dept. of Computer Science, University of California at

  Davis, Davis, CA 95616-8562 (Sep. 1996).

  [4] 微軟安全中心.

  https://www.microsoft.com/china/technet/security/default.mspx

  [5] FrSIRT. https://www.frsirt.com/english/index.php

  [6] 國際CVE標(biāo)準(zhǔn). https://www.cve.mitre.org

  [7] Mitre Corporation. Common Vulnerabilities and Exposures. Available from

  https://cve.mitre.org/ , accessed 2003.

  [8] Wenliang Du,Aditya P. Mathur. Vulnerability Testing of Software System Using

  Fault Injection.Coast TR 98-02, 1998.

  [9] CVSS. https://www.first.org/cvss/.

  [10] Matt Blaze. 2002 September 15 (Preprint, revised 2003 March 02). Cryptology

  and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. IEEE

  Security and Privacy (March/April 2003).

  [11] Steven M. Christey and Chris Wysopal. 2002 February 12 (Expired 2002 August

  12). Responsible Vulnerability Disclosure Process (Internet-Draft RFC).

  [12] Computer Emergency Response Team/Coordination Center. 2000 October 09.

  CERT/CC Vulnerability Disclosure Policy.

  [13] Computer Emergency Response Team/Coordination Center. 2003. CERT/CC

  Vulnerability Metric.

  [14] Russ Cooper. 2001. Proposal – The Responsible Disclosure Forum.

  [15] Dennis Fisher. 2003 November 18. “Security Researcher Calls for Vulnerability

  Trade Association.” eWeek.

  [16] Daniel E. Geer, Jr. (Editor), Dennis Devlin, Jim Duncan, Jeffrey Schiller, and Jane

  Winn. 2002 Third Quarter. “Vulnerability Disclosure.” Secure Business Quarterly.

  [17] Daniel E. Geer, Jr. (Editor), Mary Ann Davidson, Marc Donner, Lynda McGhie,

  and Adam Shostack. 2003 Second Quarter. “Patch Management.” Secure Business Quarterly.

  [18] Tiina Havana. 2003 April. Communication in the Software Vulnerability

  Reporting Process. M.A. thesis, University of Jyvaskyla.

  [19] Internet Security Systems. 2002 November 18 (Revised). X-Force™ Vulnerability

  Disclosure Guidelines.

  [20] Elias Levy. 2001 October 21. “Security in an Open Electronic Society.”

  SecurityFocus.

  [21] Microsoft Corporation. 2002 November (Revised). Microsoft Security Response

  Center Security Bulletin Severity Rating System.

  [22] Marcus Ranum. 2000 October. “The Network Police Blotter – Full Disclosure is

  Bogus.” ;login:The Magazine of USENIX & SAGE. Volume 25, no. 6: 47-49.

  [23] Krsul V.Software Vulnerability Analysis.Department of Computer Sciences,

  Purdue University, 1998

  [24] @Stake. 2002 June 05. Security Vulnerability Reporting Policy. Available from

  https://www.atstake.com/research/policy/ , accessed 2003.

  [25] William A. Arbaugh, William L. Fithen, and John McHugh. 2000 December.

  Windows of Vulnerability: A Case Study Analysis. IEEE Computer.

  [26] Ross Anderson. 2001. Security Engineering: A Guide to Building Dependable

  Distributed Systems. John Wiley & Sons. ISBN: 0-471-38922-6.

  [27] Matt Bishop. 2003. Computer Security: Art and Science. Addison-Wesley

  Professional. ISBN: 0-201-44099-7.

  [28] Matt Bishop. 1999 September. Vulnerabilities Analysis. Proceedings of the

  Second International Symposium on Recent Advances in Intrusion Detection.

  [29] 單國棟, 戴英俠, 王航. 計(jì)算機(jī)漏洞分類研究. 計(jì)算機(jī)工程,2002,28(10):3-6

  [30] 夏云慶 編著 Visual C++ 6.0 數(shù)據(jù)庫高級編程 北京希望電子出版社

  [31] 段鋼 編著 加密與解密(第二版) 電子工業(yè)出版社

  [33] 候俊杰 著 深入淺出MFC 第2 版 華中科技大學(xué)出版社

  [34] Applied Microsoft.NET Framework Programming (美) Jeffrey Richter 著 清華

  大學(xué)出版社

  [35] National Vulnerability Database https://nvd.nist.gov

  [36] US-CERT Vulnerability Notes. https://www.kb.cert.org/vuls

  [37] SecurityFocus. https://www.securityfocus.com

  [38] Internet Security Systems – X-Force Database.

  [39] 孫鳳宏. 探索未來計(jì)算機(jī)技術(shù)發(fā)展與應(yīng)用[J]. 青海統(tǒng)計(jì), 2007,(11) .

  [40] 蔡芝蔚. 計(jì)算機(jī)技術(shù)發(fā)展研究[J]. 電腦與電信, 2008,(02) .

  [41] 文德春. 計(jì)算機(jī)技術(shù)發(fā)展趨勢[J]. 科協(xié)論壇(下半月), 2007,(05) .

  [42] 姚正. 計(jì)算機(jī)發(fā)展趨勢展望[J]. 商情(教育經(jīng)濟(jì)研究), 2008,(01) .

  [43]《計(jì)算機(jī)研究與發(fā)展》簡介[J]. 計(jì)算機(jī)研究與發(fā)展, 2008,(01) .

  [44] 許封元. 計(jì)算機(jī)發(fā)展趨勢[J]. 農(nóng)業(yè)網(wǎng)絡(luò)信息, 2006,(08) .

  [45] 陳相吉. 未來計(jì)算機(jī)與計(jì)算機(jī)技術(shù)的發(fā)展[J]. 法制與社會(huì), 2007,(10) .

  [46] 何文瑤. 計(jì)算機(jī)技術(shù)發(fā)展態(tài)勢分析[J]. 科技創(chuàng)業(yè)月刊, 2007,(05) .

本文已影響6827
上一篇: 下一篇:國際商務(wù)管理專業(yè)教程參考文獻(xiàn)

相關(guān)文章推薦

|||||