|
1. 鮑友仲, “初探「緩衝區溢位」攻擊”, http://www.hacker.org.tw/mirrorz/Hackland/bo1.html, 2. 國家資通安全會報技術服務中心, “SQL Injection之解決建議措施及相關資訊彙整”, http://www.icst.org.tw/content/application/ncert/leakrepair/guest-cnt-browse.php?grpid=&vroot=&cntgrp_ordinal=&cnt_id=455, 2004-9-30 3. 綠盟科技, “跨站腳本說明”, http://www.nsfocus.net/index.php?act=sec_doc&do=view&doc_id=799, 2005-1-10 4. RFC2616, “Hypertext Transfer Protocol – HTTP/1.1”, http://www.csie.ncu.edu.tw/~jrjiang/NCUNetP2004/rfc2616.txt, June 1999 5. RFC1945, “Hypertext Transfer Protocol - HTTP/1.0”, http://www.w3.org/Protocols/rfc1945/rfc1945, May 1996 6. The Apache Software Foundation, HTTP Server, www.apache.org 7. Ben Laurie, Peter Laurie, “Apache The Definitive Guide 3rd Edition”, O’Reilly - 2002 8. The Apache Software Foundation, “The Apache Modeling Project”, http://apache.hpi.uni-potsdam.de/document/Contents.html 9. RFC1321, “The MD5 Message-Digest Algorithm”, http://www.faqs.org/rfcs/rfc1321.html, April 1992 10. Sleepycat Software, Inc. “Berkeley DB Reference Guide”, http://www.cs.sunysb.edu/documentation/BerkeleyDB/ref/toc.html 11. RFC3174, “US Secure Hash Algorithm (SHA1)”, http://www.faqs.org/rfcs/rfc3174.html, September 2001. 12. The Apache Software Foundation, “ab -- The Apache HTTP server benchmarking tool”, http://httpd.apache.org/docs-2.0/programs/ab.html
|