參考文獻 |
【中文文獻】
【TW-CERT】TW-CERT, Web安全檢查報告http://www.cert.org.tw/
【Xforce 2000】X-force, 研討會講義, 鈺松國際2000年駭客趨勢研討會, 台北, 2000年五月
【林育民 2000】林育民, ”通資安全政策與作業程序”, 我國通資訊基礎建設安全機制討論會, 工研院電通所主辦, 2000年3月
【林秉忠 99】林秉忠, “網路環境下之系統安全評估” ,中山資管所碩士論文, 1999年6月
【陳宗裕 99】陳宗裕, ”網路誘陷服務研討會講義”, 實戰網路系統入侵與安全防護研討會,TW-CERT主辦,台北,1999年12月
【陳昱仁 99】陳昱仁, ”電子資料傳輸安全機制之研究”, 交大資管所博士論文, pp.7-26, 1999年
【陳昱仁 99】陳昱仁, ”電子資料傳輸安全機制之研究”, 交大資管所博士論文, pp.7-26, 1999年
【張若衡 99】張若衡譯, ”超級防火牆比一比”,網路通訊雜誌, 1999年8月, pp.64-73
【黃世昆 98】黃世昆, ”軟體系統安全弱點初探”,
http://www.cert.org.tw/newsletter/article/199812-1.htm, 1998
http://www.cert.org.tw/newsletter/article/199812-1.htm, 1998
http://www.cert.org.tw/newsletter/article/199812-1.htm, 1998
【英文文獻】
【Anonymous 98】Anonymous, Maximum Security — A Hackers Guide to Protecting Your Internet Site and Network, Second edition, SAMS, 1998
【Barnes 97】Anthony L, Barnes, "Applying Survivability" — ISW’97, February 12-13, 1997, San Diego, USA
【Brenton 99】Chris Brenton 1999, “Mastering Network Security”, XYBEX Network Press, pp. 141-289
【Checkpoint】http://www.checkpoint.com/products/firewall-1/index.htm
【Cohen 99】Fred Cohen’s Deception Toolkit http://www.all.net/dtk/
【eTrust 99】eTrust Intrusion Detection (formerly SessionWall-3)
http://www.cai.com/solutions/enterprise/etrust/intrusion_detection
【Felten 97】Edward W. Felten, Dirk Balfanz, Drew Dean, Dan S. Wallach, ”Web Spoofing: An Internet Con Game”, Technical Report 540-96, Princeton University, revised Feb. 1997.
【Goan 99】Terrance Goan, ”A Cop on the Beat: Collecting and Appraising Intrusion Evidence”, Communications of the ACM, Vol. 42, No. 7, 1999, pp. 46-52
【Graham 99】Robert Graham, “ FAQ: Network Intrusion Detection Systems” http://www.ticm.com/kb/faq/idsfaq.html
【ISS】 ISS SAFEsuit FAMILY — Realsecure http://www.firewall.com.tw
【ISS 98】 ISS, “Network-vs. Host-based Intrusion Detection — A Guide to Intrusion Detection Technology”, Internet Security Systems, Inc., 1998/10
【Klander 99】Lars Klander, Hacker proof : the ultimate guide to network security, McGraw-Hill, 1999, pp. 1-45.
【Loew 99】Robert Loew, Ingo Stengel, Udo Bleimann and Aidan McDonald, ”Security aspects of an enterprise-wide network architecture”, Internet Research, Vol 9, No. 1, 1999, pp.8-15
【McClure 99】Stuart McClure, Joel Scambray, George Kurtz, “Hacking Exposed: Network Security Secrets & Solutions”, McGraw-Hil, 1999, Chapter 2-3,10-11
【McClure 99】Stuart McClure, Joel Scambray, George Kurtz, “Hacking Exposed: Network Security Secrets & Solutions”, McGraw-Hil, 1999, Chapter 2-3,10-11
【Netscreen】http://www.netscreen.com/pub/index2.html
【Northcutt 99】Stephen Northcutt, Network Intrusion Detection:An Analyst’s Handbook, New Riders, 1999 , pp.209-249
【Oaks 98】Scott Oaks, Java Security, O’Reilly & Associates, 1st Edition, May 1998, pp. 1-16
【OPSEC】Open Platform for Security(OPSEC)
http://www.checkpoint.com/opsec/architect.htm
【Power 99】Richard Power, “1999 CSI/FBI Computer Crime and Security Survey”, Computer Security Journal, Vol. XV, Number 2 1999, pp.29-45
【Ranum+】Marcus J. Ranum and Matt Curtin “Internet Firewalls FAQ” http://www.ticm.com/kb/faq/fwfaq/firewalls-faq.html
【Ranum 99】Marcus Ranum “Intrusion Detection System: Expectations, Ideals and Realities”, Computer Security Journal, Vol. XIV, No. 4, 1999, pp. 25-43
【Recourse】http://www.recourse.com/recourse/products/mantrap.html Recourse Technologies, Inc.
【Rusell 99】Paul Russell, ”Linux IPCHAINS-HOWTO”, Vol.l.0.7,
http://www.rustcorp.com/linux/ipchains, 1999/03
【Schepers 98】Filip Schepers, “Network-versus host-based intrusion detection”, Information Secuirty Technical Report, Vol.3, No.4, 1998, pp.32-42
【Spitzner】L.Spitzner “To Build a Honeypot”,
http://www.enteract.com/~lspitz/honeypot.html
【Stallings 99】William Stallings, Cryptography and Network Security: Principles and Practice, Chapter 16, Prentice-Hall, Inc., 1999, 2nd Ed
【Sutterfield 97】Lee Sutterfield, “Large-Scale Network Intrusion Detection”, Computer Security Journal, Vol. XII, No. 2, 1997, pp.41-48
【White 99】Gregory B. White, “Protecting the Real Corporate Network”, Computer Security Journal, Vol. XIV, No. 4, 1999, pp. 47-58 |