一、中文部分
Atul, K. (2003),網路安全與密碼學(楊政穎譯),台北:學貫行銷股份有限公司,(原文於 2003 年出版)。
GaryLee(2008),簡介SQLite,[線上資料],來源:http://www.dev.idv.tw:8080/mediawiki/index.php/%E7%B0%A1%E4%BB%8BSQLite [2008, April 01]。
李卓翰(2006),資料倉儲理論與實務第二版,台北:學貫行銷股份有限公司。
林克韋(2002),DW資料不一致之研究,國立中央大學資訊管理研究所未出版之碩士論文。林誠謙,李世昌,鄧炳坤(2004),全球網格(World Wide Grid)發展趨勢,台北:中研院計算中心。
林傑斌,卓彰賢,張一岑(2006),資料倉儲理論、設計與應用,台北:網奕資訊科技股份有限公司。
林儒霆(2008),以資料倉儲建構國內股市投資決策支援系統之研究,中國文化大學資訊管理研究所未出版之碩士論文。
高秀美(2002),資料倉儲簡介,[線上資料],來源:http://www.nii.org.tw/cnt/ECNews/ColumnArticle/article_148.htm [2006, May 06]。
呈秉輝(2002),駭客任務實戰-個人電腦漏洞篇,台北:旗標出版股份有限公司。
粘添壽,吳順裕(2004),資訊與網路安全技術,台北:旗標出版股份有限公司。
張傑生(2004),網格運算服務介紹,國立台灣大學計算機及資訊網路中心,[線上資料],來源:http://grid.ntu.edu.tw/html/intro2.html [2008, March 15]。
賴榮樞(2005),IPSec協定與應用,[線上資料],來源:http://www.microsoft.com/taiwan/technet/columns/profwin/14-IPSec-2.mspx [2008, February 21]。
二、英文部分
Alkis, S., & Panos, V. (2003). A methodology for the conceptual modeling of ETL processes. CAiSE Workshops 2003.
Gabrielle, A., Thomas, D., Ian, F., Nicholas, T. K., Matie, R., Edward, S., & Brian, T. (2001). Supporting efficient execution in heterogeneous distributed computing environments. Archive of Conference on High Performance Networking and Computing, 01, 52-52.
Gary, M., & John, V. (2001). Make your software behave: Everything to hide [Online]. Available: http://www.ibm.com/developerworks/library/s-everything.html [2007, May 01].
Matteo, G., Dario, M., & Stefano, R. (1998). The dimensional fact model: A conceptual model for data warehouses, International Journal of Cooperative Information Systems, 7(2-3), 215-247.
Hamid, R. N., David, M. S., Lakshmi, S. I., & Richard, T. H. (2002). Knowledge warehouse: An architectural integration of knowledge management, decision support, artificial intelligence and data warehousing. Journal of Decision Support Systems, 33(2), 143-161.
Inmon, W. H. (1996). The data warehouse and data mining. Communications of the ACM, 39(11), 49-50.
Ian, F. (2002). What is the Grid? A three point checklist. Gridtoday: Daily news and information for the global grid community, 1(6).
Ian, F., & Carl, C. (1999). The GRID: Blueprint for a new computing infrastructure. San Fransisco: Morgan Kaufmann Publishers, Inc.
Ian, F., Carl, K., & Steven, T. (2001). The anatomy of the grid: Enabling scalable virtual organizations. International J. Supercomputer Applications. International Journal of Supercomputer Applications, 15(3), 200-222.
Inmon, W. H. (2002). Building the data warehouse (3rd ed.). New York: John Wiley & Sons.
Schopf, J .M., & Nitzberg, B. (2002). Grids: Top ten questions, Scientific Programming, special issue on Grid Computing, 10(2), 103-111.
Jorge, S. (2008). Hash function [Online]. Available: http://en.wikipedia.org/wiki/Hash_function [2008, April 24].
Lambian (2007). Cryptographic hash function [Online]. Available: http://en.wikipedia.org/wiki/Cryptographic_hash_function [2008, May 05].
Matt, H. (2004). What's different between grid computing and P2P, CORBA, cluster computing, and DCE? [Online]. Available: http://www-106.ibm.com/developerworks/grid/library/gr-heritage/?Open&ca=daw [2005, January 23].
Matt, Intgr, & Bovineone (2008). RC5. [Online]. Available: http://en.wikipedia.org/wiki/RC5 [2008, May 04].
Matt, Intgr, & Ntsimp (2008). International data encryption algorithm. [Online]. Available: http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm [2008, April 06].
Matt, Intgr, & Pichote (2008). Block cipher modes of operation. [Online]. Available: http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation [2008, May 24].
Matteo, G., & Stefano, R. (1999). Designing the data warehouse: Key steps and crucial issues, Journal of Computer Science and Information Management, 2(3), 1-14.
Matthias, J., Maurizio, L., Yannis, V., & Panos, V. (2003). Fundamentals of data warehouses (2nd ed.). Springer-Verlag, Berlin.
Michael, R. G., Arthur, M. K., & Oliver M. D. (1997). Infomaster: An information integration system, ACM SIGMOD Conference, 15(3), 539-542.
Murdoch, M. (2001). Introduction to cryptography, Part 1: The broad view [Online]. Available: http://www.ibm.com/developerworks/library/s-crypt01.html [2007, May 25].
Murdoch, M. (2001). Introduction to cryptography, Part 2: Symmetric cryptography. [Online]. Available: http://www.ibm.com/developerworks/library/s-crypt02.html [2001, May 25].
Murdoch, M. (2001). Introduction to cryptography, Part 3: Asymmetric cryptography [Online]. Available: http://www.ibm.com/developerworks/library/s-crypt03.html [2001, Mar 01].
Nancy, B., & Jerry, P. (2007). How google works [Online]. Available: http://www.googleguide.com/google_works.html [2007, April 27].
Panos, V., Alkis, S., & Spiros, S. (2002). Data warehousing and OLAP. New York: ACM.
Panos, V., Christoph, Q., Yannis, V., & Matthias, J. (2001). Data warehouse process management, International Journal of Information Systems, 26(3), 205-236.
Poe, V., Klauer, P., & Brobst, S. (1998). Building a data warehouse for decision support. Indiana: Prentice Hall PTR.
Surajit, C., & Umeshwar, D. (1997). An overview of data warehousing and OLAP technology. New York: ACM.
Xiaoyun, W., Dengguo, F., Xuejia, L., & Hongbo, Y. (2004), Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD [Online]. Available: http://eprint.iacr.org/2004/199.pdf [2008, March 14].