|
[1]林東清, e化企業的核心競爭能力(五版), 台北:智勝文化事業有限公司, 2013. [2]陳明照, Kali Linux滲透測試工具(第二版), 台北:碁峰資訊股份有限公司, 2015. [3]楊波, 用Kali Linux破解每一台連網裝置, 佳魁資訊,September 2015. [4]熊信彰, 實戰雲端作業系統建置與維護:VMware vSphere 5.5虛擬化全面啟動, 台北:碁峰資訊股份有限公司, 2014. [5]鄧思源,劉秉昕, vSphere為基礎之私有雲及數種個人鑑識初探, 中央警察大學期刊, 2015. [6]顧武雄, 雙管齊下搞定vSphere 綜合運用GUI及文字介面, 網管人, 參考日期:10,03,2016. [7]Ankita Gupta, Kavita and Kirandeep Kaur, Penetration Testing and Vulnerability Analysis, International Journal of Engineering Trends and Technology Vol.4 Issue3, 2013. [8]Florian Bergsma, Benjamin Dowling and Florian Kohlar, Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol, Conference on Computer and Communications Security, November 2014. [9]iThome, 2016年CIO大調查:企業雲端投資總論雲端投資比重翻倍,2成企業積極擁抱混合, http://www.ithome.com.tw/article/103821, 參考日期:08,06, 2016. [10]iThome, 2014年CIO大調查(下):2014企業私有雲應用分析, http://www.ithome.com.tw/article/858302, 參考日期:08,06,2016. [11]iThome, 2016年CIO大調查:企業雲端平臺採用動向, 臺灣公有雲龍頭將換人, 17.7%企業要用微軟Azure, http://www.ithome.com.tw/article/103825, 參考日期:08,06,2016. [12]Jai Narayan Goel and BM Mehtre, Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology, 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015), p710-715, August 2015. [13]Kali linux, https://zh.wikipedia.org/wiki/Kali_Linux, Access date: 08,10,2016. [14]Lovepreet, Poonamjit Kaur, A Descriptive Study of various Penetration Testing Tools and Techniques, International Journal of Computer and Communication System Engineering, Vol.2, p420-424, June 2015. [15]Mahin Mirjalili, Alireza Nowroozi and Mitra Alidoosti, A survey on web penetration test, Computer Science, Vol. 3, Issue 6, No.12, November 2014. [16]Medusa, http://foofus.net/goons/jmk/medusa/medusa-compare.html, Access date:02,12,2016. [17]Mike Brown, VMware vCenter Serve 6.0 Deployment Guide Technical white paper V 1.0, February 2015. [18]Navneet Kaur, Security Effectiveness of Virtual DMZ in Private Clouds, Computing Dissertations and Theses, 2014. [19]Peter Mell and Timothy Grance, The NIST Definition of Cloud Computing,National Institute of Standards and Technology, September 2011. [20]Pece J. Mitrevski adnd Tome Dimovski, Evaluating Website Security with Penetration Testing Methodology, Researchgate, October 2014. [21]Ralph LaBarg and Thomas McGuire, CLOUD PENETRATION TESTING, International Journal on Cloud Computing: Services and Architecture, Vol. 2 No.6, December 2012. [22]RightScale, 2016 State Of The Cloud Report, January 2016. [23]Shiv Raj Singh, A Virtualized DMZ Design Consideration Using VMware ESXi 4.1, Computing Dissertations and Theses, 2012. [24]SSH, https://www.ssh.com, Access date:02.12,2016 [25]Tran Khanh Dang, Que Nguyet and Tran Thi, Towards side-effects-free database penetrationtesting, ResearchGate, June 2016. [26]Youssef Ayyad, Hamid Magrez and Abdelhak Ziyyat, Security Concerns in a Web-Based E-learningPlatform, ResearchGate, February 2016.
|