饭团爱上飞
[1] 冯登国. 计算机通信网络安全. 北京:清华大学出版社, 2001[2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN0-201-10150-5.[3] M. Bishop and D. Bailey, “A Critical Analysis of Vulnerability Taxonomies”,Technical Report CSE-96-11, Dept. of Computer Science, University of California atDavis, Davis, CA 95616-8562 (Sep. 1996).[4] 微软安全中心.[5] FrSIRT. [6] 国际CVE标准. [7] Mitre Corporation. Common Vulnerabilities and Exposures. Available from , accessed 2003.[8] Wenliang Du,Aditya P. Mathur. Vulnerability Testing of Software System UsingFault TR 98-02, 1998.[9] CVSS. .[10] Matt Blaze. 2002 September 15 (Preprint, revised 2003 March 02). Cryptologyand Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. IEEESecurity and Privacy (March/April 2003).[11] Steven M. Christey and Chris Wysopal. 2002 February 12 (Expired 2002 August12). Responsible Vulnerability Disclosure Process (Internet-Draft RFC).[12] Computer Emergency Response Team/Coordination Center. 2000 October Vulnerability Disclosure Policy.[13] Computer Emergency Response Team/Coordination Center. 2003. CERT/CCVulnerability Metric.[14] Russ Cooper. 2001. Proposal – The Responsible Disclosure Forum.[15] Dennis Fisher. 2003 November 18. “Security Researcher Calls for VulnerabilityTrade Association.” eWeek.[16] Daniel E. Geer, Jr. (Editor), Dennis Devlin, Jim Duncan, Jeffrey Schiller, and JaneWinn. 2002 Third Quarter. “Vulnerability Disclosure.” Secure Business Quarterly.[17] Daniel E. Geer, Jr. (Editor), Mary Ann Davidson, Marc Donner, Lynda McGhie,and Adam Shostack. 2003 Second Quarter. “Patch Management.” Secure Business Quarterly.[18] Tiina Havana. 2003 April. Communication in the Software VulnerabilityReporting Process. . thesis, University of Jyvaskyla.[19] Internet Security Systems. 2002 November 18 (Revised). X-Force™ VulnerabilityDisclosure Guidelines.[20] Elias Levy. 2001 October 21. “Security in an Open Electronic Society.”SecurityFocus.[21] Microsoft Corporation. 2002 November (Revised). Microsoft Security ResponseCenter Security Bulletin Severity Rating System.[22] Marcus Ranum. 2000 October. “The Network Police Blotter – Full Disclosure isBogus.” ;login:The Magazine of USENIX & SAGE. Volume 25, no. 6: 47-49.[23] Krsul Vulnerability of Computer Sciences,Purdue University, 1998[24] @Stake. 2002 June 05. Security Vulnerability Reporting Policy. Available from , accessed 2003.[25] William A. Arbaugh, William L. Fithen, and John McHugh. 2000 of Vulnerability: A Case Study Analysis. IEEE Computer.[26] Ross Anderson. 2001. Security Engineering: A Guide to Building DependableDistributed Systems. John Wiley & Sons. ISBN: 0-471-38922-6.[27] Matt Bishop. 2003. Computer Security: Art and Science. Addison-WesleyProfessional. ISBN: 0-201-44099-7.[28] Matt Bishop. 1999 September. Vulnerabilities Analysis. Proceedings of theSecond International Symposium on Recent Advances in Intrusion Detection.[29] 单国栋, 戴英侠, 王航. 计算机漏洞分类研究. 计算机工程,2002,28(10):3-6[30] 夏云庆 编著 Visual C++ 数据库高级编程 北京希望电子出版社[31] 段钢 编著 加密与解密(第二版) 电子工业出版社[33] 候俊杰 著 深入浅出MFC 第2 版 华中科技大学出版社[34] Applied Framework Programming (美) Jeffrey Richter 著 清华大学出版社[35] National Vulnerability Database [36] US-CERT Vulnerability Notes. [37] SecurityFocus. [38] Internet Security Systems – X-Force [39] The Open Source Vulnerability Database
龙井12345
计算机毕业设计外文参考:
[1].Abdellatif,.
[2].Bharti,.——。
一般格式如下:
作者.著作名称[M].出版社所在城市:出版社名称,出版年份:页码.
示例:金太军.村治治理与权力结构[M].广州:广州人民出版社,2008:50.
扩展资料
最主要的是根据载体把文献分为印刷型、缩微型、机读型和声像型。
(1)印刷型:是文献的最基本方式,包括铅印、油印、胶印、石印等各种资料。优点查可直接、方便地阅读。
(2)缩微型:是以感光材料为载体的文献,又可分为缩微胶卷和缩微平片,优点是体积小、便于保存、转移和传递。但阅读时须用阅读器。
会计论文外文参考文献 会计论文外文参考文献都有哪些呢?下面是我整理的会计论文外文参考文献,欢迎参考借鉴! [1]徐静.我国企业社会责任会计信息披露探析[J].企
先到百度文库,找一篇此类文档中文的,然后用有道翻译,或是谷歌在线翻译翻成英 文,然后把英文放上面,中文放下面。希望可以帮到你。如果要找标准的PDF格式外文文 献
计算机论文参考文献 在学习、工作中,大家都跟论文打过交道吧,论文对于所有教育工作者,对于人类整体认识的提高有着重要的意义。你知道论文怎样才能写的好吗?下面是我为
计算机论文常用参考文献 在平平淡淡的日常中,大家都有写论文的经历,对论文很是熟悉吧,论文一般由题名、作者、摘要、关键词、正文、参考文献和附录等部分组成。写论文的
计算机专业论文参考文献 参考文献在各个学科、各种类型出版物都有着明确的标注法。以下是我为您整理的计算机专业论文参考文献,希望能提供帮助。 篇一:参考文献 [1]