參考文獻
中文
[1]王蓮芬,「網路分析法(ANP)的理論與算法」,系統工程理論與實踐第3期,pp. 44-50,2001。
[2]林勤經,樊國楨,方仁威,黃景彰,「資訊安全管理系統建置工作之研究」,資訊管理研究,第4卷,第2期,p43-69,2002年7月。[3]教育部校園資訊安全服務網,http://cissnet.edu.tw/。
[4]陳志豪,「弱點評估及不良設定檢測之研究與實作」,國立成功大學電腦與通訊研究所碩士論文,pp. 72,2007。[5]陳盈達,「網際網路防火牆政策驗證系統」,逢甲大學資訊工程學系碩士班碩士論文,pp. 1,2006。[6]黃小玲,「個資法與國際隱私管理標準、規範之分析與應用」,資訊安全通訊,第17卷,第3期,p.22-36,2011年7月。
[7]黃鵬羽,楊中皇,「異質性弱點資料庫整合與研究」,2009資訊科技國際研討會,pp. 2,2009。
[8]葉桂珍,張榮庭,「企業之資訊安全策略與其產業別及資訊化程度關係探討」,資訊管理學報,第13卷,第2期,p.113-143,2006年4月。[9]詹燦芳,「國內ISMS導入效益、成功要素與遭遇困難之研究」,國立臺灣科技大學資訊管理系碩士論文,pp. 79,2007。[10]褚志鵬,「層級分析法(AHP)理論與實作」,國立東華大學企業管理學系教材,pp. 12,2009。
[11]樊國楨,黃健誠,「個人資料保護與資訊安全管理初探」,電腦稽核,第23期,p.1-15,2011年1月。
[12]樊國楨,朱潮昌,黃健誠,「影響組織採行與應用資訊安全管理系統認證之關鍵因素」,資訊安全通訊,第17卷,第3期,p.3-21,2011年7月。
[13]蘇建源,蔡旻修,阮金聲,「以個案分析法探討金融業之企業營運持續管理」,電腦稽核,第24期,p.65-81,2011年7月。
英文
[14]BSI British Standards Institute's Taiwan branch, http://www.bsigroup.tw/zh-tw.
[15]C. Kruegel and G. Vigna, "Anomaly Detection of Web-based Attacks," Proc of the 10th ACM Conference on Computer and Communication Security (CCS-03), USA, pp. 251-261, October 2003.
[16]C.H. Lin, C.H. Chen and C.S. Laih, "A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection," Asia-Pacific Services Computing Conference 2008, pp. 1252-1257, 2008.
[17]Cisco Systems Inc. "Cisco ASDM User Guide Version 5.2," http://www.cisco.com /en/US/docs/security/asa/asa72/asdm52/user/guide/ASDMp.pdf, pp. 17-1-10, 2008.
[18]F. Feng and H.Y. Liu, "Evaluation of logistics service provider using analytic network process," Third International Conference on Natural Computation (ICNC 2007), pp. 227-231, 2007.
[19]G. Vache, "Vulnerability Analysis for a Quantitative Security Evaluation," ESEM'09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement, pp. 526-534, 2009.
[20]J. Edwards and D. DeVoe, "3-Tier Client/Server at Work," John Wiley & Sons Inc.,1997.
[21]J. Sun, H. Chen and C. Niu, "A New Database Firewall Based on Anomaly Detection," Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2010 International Conference, pp. 399-404, 2010.
[22]K. Scarfone and P. Mell, "An Analysis of CVSS Version 2 Vulnerability Scoring," ESEM'09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement, pp. 516-525, 2009.
[23]M.D. Aime and F. Guasconi, "Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management," 2010 Third International Conference on Dependability, pp. 92-97, July 2010.
[24]MITRE Corporation, "Common Vulnerabilities and Exposures (CVE)," http://cve. mitre.org/.
[25]Microsoft TechNet, Security TechCenter Library, http://technet.microsoft.com/en-us /library/cc875841.aspx.
[26]National Infrastructure Advisory Council, "Common Vulnerability Scoring System," http://www.first.org/cvss/cvss-dhs-12-02-04.pdf.
[27]Open Source Vulnerability Database, http://osvdb.org/.
[28]P. Mell, K. Scarfone and S. Romanosky, "A Complete Guide to the Common Vulnerability Scoring System Version 2.0," Forum of Incident Response and Security Teams, June 2007.
[29]R. Arnott, "A Review of Current Firewall Technologies," 2002.
[30]R. Kuhn and C. Johnson, "Vulnerability Trends Measuring Progress," IT Professional, pp. 51-53, July 2010.
[31]T.L. Saaty, "Decision making with dependence and feedback: the analytic network process," Pittsburgh, PA: RWS Publications, 1996.
[32]T.L. Saaty, "The analytic hierarchy process," New York, McGraw-Hill, 1980.
[33]X. Ji and C. Pattinson, "AHP Implemented Security Assessment and Security Weight Verification, socialcom," 2010 IEEE Second International Conference on Social Computing, pp. 1026-1031, 2010.