[1] Linux 口惠實不實? http://taiwan.cnet.com/news/ce/0,2000062982,20102307,00.htm
[2] Linux在市場上之趨勢與機會 http://www.idc.com.tw/report/Column/column_040823.htm
[3] 賽門鐵克 2004 年 9 月出刊第六期的『賽門鐵克網路安全威脅研究報告』。
[4] 賽門鐵克網站 http://www.symantec.com.tw/region/tw/homecomputing/article/tip12.html。
[5] OVAL網站: http://oval.mitre.org/
[6] CVE網站:http://cve.mitre.org/
[7] Nessus網站: http://www.nessus.org/
[8] Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner,”State of the Practice of Instrusion Detection Technologies”, CMU/SEI-99-TR-028。
[9] Rebecca Bace and Peter Mell , “Intrusion Detection Systems,”
National Institute of Standards and Technology , 1999 。
[10] http://www.cert.org.tw/document/column/
[11] http://www.cert.org/advisories/
[12] http://www.ithome.com.tw/itadm/news/news.php?c=34037
[13] http://www.eeye.com/html/products/retina/donload/index. htm
[14] http://www.microsoft.com/technet/security/tools/mbsaw p.mspx
[15] http://www.nstalker.com/eng/products/nstealth/
[16] http://cve.mitre.org/docs/docs2000/naming_process.html
[17] http://www.cirt.net/code/nikto.shtml
[18] http://www.yesinfo.com.tw/product/ISS/Default.aspx
[19] 陳宗裕,「支援弱點稽核與入侵偵測之整合性後端資料庫設計研究」,中原大學資訊工程研究所,碩士學位論文(90碩)。[20] http://www.insecure.org/nmap/nmap_documentation.html
[21] http://www.saintcorporation.com/products/saint_engine. html
[22] Matthew Wojcik / David Proulx / Jonathan Baker / Robert Roberge,”Introduction to OVAL:A language to determine the presence of computer vulnerabilities and configuration issues”, The MITRE Corporation,July 2005。
[23] Jay Beale, Haroon Meer, Roelof Temmingh, Charl Van Der Walt, Renaud Deraison,”Nessus Network Auditing”, Syngress Publishing, Inc.800 Hingham Street Rockland,MA 02370。
[24] http://oval.mitre.org/oval/archive/version4/index.html
[25] Harry Anderson,Introduction to Nessus,http://www.securityfocus.com/infocus/1741,2003-10-28。
[26] Harry Anderson,Nessus, Part 2: Scanning,http://www.securityfocus.com/infocus/1753,2003-12-16。
[27] Harry Anderson,Nessus, Part 3: Analysing Reports,
http://www.securityfocus.com/infocus/1759,2004-02-03。
[28] Renaud Deraison,The Nessus Attack Scripting Language Reference Guide,http://www.virtualblueness.net/nasl.html
[29] Nessus Credential Checks for UNIX and WINDOWS,Tenable Network Security,September 2005。
[30] James W. DeRoest,康凱雄譯,Samba UNIX & NT Internetworking,The McGraw-Hill Companies,Inc.,Augest 2000。
[31] 李蔚澤,IIS6 網站建置與管理,碁峰資訊股份有限公司,2003年7月初版。
[32] http://www.microsoft.com/downloads/details.aspx?FamilyID= 01c4f89d-cc68-42ba-98d2-0c580437efcf&DisplayLang=en
[33] Gerald Carter,蔣大偉譯,LDAP System Administration,O’REILLY,2003年10月初版。
[34] 顏逸品,Windows 2000 Server 企業網路建構實務~ Active Directory 篇~,博碩文化,2002年8月初版四刷。
[35] David “Del” Elson,Active Directory and Linux,http://www.securityfocus.com/infocus/1563,2002-04-03。
[36] Eric Anderson,Unite your Linux and Active Directory authentication,http://enterprise.linux.com/enterprise/04/12/09/ 2318244.shtml?tid=102&tid=101&tid=100,2004-12-16。
[37] OpenLDAP,http://www.openldap.org/
[38] http://mail.nessus.org/pipermail/plugins-writers/2005-November /msg00014.html
[39] RFC2616 - Hypertext Transfer Protocol -- HTTP/1.1 , http://www.faqs.org/rfcs/rfc2616.html
[40] RFC 2617 - HTTP Authentication: Basic and Digest Access Authentication,http://www.faqs.org/rfcs/rfc2617.html