• 回答数

    2

  • 浏览数

    123

suejasmine
首页 > 论文问答 > 计算机论文参考文献近三年

2个回答 默认排序
  • 默认排序
  • 按时间排序

一坨Lemon

已采纳
[1] 冯登国 计算机通信网络安全 北京:清华大学出版社, 2001[2] Dorothy Denning, ”Cryptography and Data Security”, Addison-W ISBN0-201-10150-[3] M Bishop and D Bailey, “A Critical Analysis of Vulnerability Taxonomies”,Technical Report CSE-96-11, D of Computer Science, University of California atDavis, Davis, CA 95616-8562 (S 1996)[4] 微软安全中心[5] FrSIRT [6] 国际CVE标准 [7] Mitre C Common Vulnerabilities and E Available from , accessed [8] Wenliang Du,Aditya P M Vulnerability Testing of Software System UsingFault ICoast TR 98-02, [9] CVSS [10] Matt B 2002 September 15 (Preprint, revised 2003 March 02) Cryptologyand Physical Security: Rights Amplification in Master-Keyed Mechanical L IEEESecurity and Privacy (March/April 2003)[11] Steven M Christey and Chris W 2002 February 12 (Expired 2002 August12) Responsible Vulnerability Disclosure Process (Internet-Draft RFC)[12] Computer Emergency Response Team/Coordination C 2000 October CERT/CC Vulnerability Disclosure P[13] Computer Emergency Response Team/Coordination C CERT/CCVulnerability M[14] Russ C Proposal – The Responsible Disclosure F[15] Dennis F 2003 November “Security Researcher Calls for VulnerabilityTrade A” eW[16] Daniel E Geer, J (Editor), Dennis Devlin, Jim Duncan, Jeffrey Schiller, and JaneW 2002 Third Q “Vulnerability D” Secure Business Q[17] Daniel E Geer, J (Editor), Mary Ann Davidson, Marc Donner, Lynda McGhie,and Adam S 2003 Second Q “Patch M” Secure Business Q[18] Tiina H 2003 A Communication in the Software VulnerabilityReporting P MA thesis, University of J[19] Internet Security S 2002 November 18 (Revised) X-Force™ VulnerabilityDisclosure G[20] Elias L 2001 October “Security in an Open Electronic S”SecurityF[21] Microsoft C 2002 November (Revised) Microsoft Security ResponseCenter Security Bulletin Severity Rating S[22] Marcus R 2000 O “The Network Police Blotter – Full Disclosure isB” ;login:The Magazine of USENIX & SAGE Volume 25, 6: 47-[23] Krsul VSoftware Vulnerability ADepartment of Computer Sciences,Purdue University, 1998[24] @S 2002 June Security Vulnerability Reporting P Available from , accessed [25] William A Arbaugh, William L Fithen, and John McH 2000 DWindows of Vulnerability: A Case Study A IEEE C[26] Ross A Security Engineering: A Guide to Building DependableDistributed S John Wiley & S ISBN: 0-471-38922-[27] Matt B Computer Security: Art and S Addison-WesleyP ISBN: 0-201-44099-[28] Matt B 1999 S Vulnerabilities A Proceedings of theSecond International Symposium on Recent Advances in Intrusion D[29] 单国栋, 戴英侠, 王航 计算机漏洞分类研究 计算机工程,2002,28(10):3-6[30] 夏云庆 编著 Visual C++ 0 数据库高级编程 北京希望电子出版社[31] 段钢 编著 加密与解密(第二版) 电子工业出版社[33] 候俊杰 著 深入浅出MFC 第2 版 华中科技大学出版社[34] Applied MNET Framework Programming (美) Jeffrey Richter 著 清华大学出版社[35] National Vulnerability Database [36] US-CERT Vulnerability N [37] SecurityF [38] Internet Security Systems – X-Force D[39] The Open Source Vulnerability Database
344 评论

张小电1301

346 评论

相关问答

  • 计算机毕业论文参考文献近三年

    张爱平,赖欣JSP调用JavaBean实现Web数据库访问[J]计算机时代,2007,(01)仲伟和基于JSP网页自动生成工具设计与实现[J]科技信息(科学教研

    粘土宝宝 1人参与回答 2023-12-09
  • 2020年近三年的会计参考文献

    会计学毕业论文参考文献一:  [1]胡敏基于阿米巴经营理念的财务成本管控分析[J]现代商贸工业,2019,40(20):119-  [2]谢建厂大数据视角下财务

    winnie1103 1人参与回答 2023-12-11
  • 会计参考文献近三年2021

    1.娄尔行:《基础会计学》,上海财经大学出版社2000年版。 2.朱小平:《初级会计学》,中国人民大学出版社2002年版。 3.陈少华:《会计学原理》,厦门

    再遇见67 1人参与回答 2023-12-10
  • 近三年的会计参考文献

    并不是别国中

    刘二蛋蛋蛋 2人参与回答 2023-12-06
  • 2021年近三年的会计参考文献

    1.娄尔行:《基础会计学》,上海财经大学出版社2000年版。 2.朱小平:《初级会计学》,中国人民大学出版社2002年版。 3.陈少华:《会计学原理》,厦门

    透明的黑布 1人参与回答 2023-12-11