An Introduction to Computer Security: The Nist Handbook

作者: Barbara Guttman , Edward Roback

DOI:

关键词: NISTSecurity serviceSoftware engineeringThreatInformation securityCloud computing securitySecurity controlsComputer security modelBusinessComputer securitySecurity information and event management

摘要:

参考文章(113)
D. Brent Chapman, Network (In)Security Through {IP} Packet Filtering {UNIX} Security Symposium {III} ({UNIX} Security 92). ,(1992)
William L. Scherlis, Stephen L. Squires, Richard D. Pethia, Computer emergency response Computers under attack: intruders, worms, and viruses. pp. 495- 504 ,(1991) , 10.1145/102616.102654
Mark William Talbot, Robert Ross Peterson, Lisa Anne Seacat, Kulvir Singh Bhogal, Keeping conversations confidential ,(2008)
Justin Emond, Chris Steins, Support and Operations Apress. pp. 163- 177 ,(2011) , 10.1007/978-1-4302-4084-6_11
Jackie Shieh, Rhea A-L Ballard, E-Mail Privacy. EDUCOM Review. ,vol. 29, pp. 59- 61 ,(1994)