|
{1}.ANDY BRINEY – Security Focused SURVEY 2000 {2}.張智晴,林盈達 – 網路的攻擊與防護機制 {3}.Moira J. West-Brown, Don Stikvoort, Klaus-Peter Kossakowski, December 1998 Handbook for Computer Security Incident Response Teams (CSIRTs) {4}.Published in The Froehlich/Kent Encyclopedia of Telecommunications vol. 15. Marcel Dekker, New York, 1997, pp. 231-255. Security of the Internet {5}.N. Brownlee, The University of Auckland E. Guttman, Sun Microsystems, June 1998, Expectations for Computer Security Incident Response {6}.Andy Briney, Information security magazine September 2000 p40-p68, Security Focused Survey 2000 {7}.Andy Briney, Information security maganize October 2001 p34-p47, Industry Survey 2001 {8}.Levy, S., Hackers: Heroes of the Computer Revolution, Anchor Press/Doubleday, Garden City, NY, 1984. {9}.Stoll, C., The Cuckoo''s Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, New York, 1989. {10}.4.Denning, P. J., (ed.), Computers Under Attack: Intruders, Worms, and Viruses, ACM Press, Addison-Wesley, New York, 1990. {11}.Paul Mason Ford, Incident Reporting & Automation, 2001 March 9, {12}.Dan Hanson, Mario van Velzen, Sean Hittel, and Jensenne Roculan, ARIS Top Ten 2001 Threats, January 31, 2002 {13}.Compaq Secure Solutions Team, February 2002,Security Enhancementsfor Microsoft Windows 2000,Windows 2000 (SE) {14}.Computer Security Incident Response Team (CSIRT) Frequently Asked Questions (FAQ) -www.cert.org {15}.CERT/CC Statistics 1988-2001- http://www.cert.org/stats/cert_stats.html {16}.John Fisher (CIAC, USA) / Incident Request and Ticketing System (IRTS) {17}. Computer Incident Advisory Capability (CIAC) http://www.ciac.org/ciac/ {18}. John D. Howard April 7, 1997 / An Analysis Of Security Incidents On The Internet {19}. http://www.microsoft.com/technet/security/bulletin/MS02-018.asp {20}. Lockdown, http://www.microsoft.com/technet/security/tools/locktool.asp {21}. URLscan, http://www.microsoft.com/technet/security/URLScan.asp {22}. http://www.nohack.com.tw/ {23}. Stopping Attacks: The Importance of Denial of Service (DoS) Security Appliances, 2002, Newmediary, Inc. {24}. Top Attacks for the 1st Quarter 2002, http://www.securityfocus.com/corporate/research/top10attacks_q1_2002.shtml {25}. A Very Real and Present Threat to the Internet: Resurgence in Code Red Scanning Activity, CERT/CC, August 1, 2001, http://www.cert.org/archive/html/coderedannounce.html {26}. Windows NT Security and Configuration Resources, {27}.林柏宇 ,大規模網路安全掃描之研究, 2002/06
|