2016计算机专业论文参考文献
计算机专业毕业论文参考文献
[1] 冯登国. 计算机通信网络安全. 北京:清华大学出版社, 2001
[2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN
0-201-10150-5.
[3] M. Bishop and D. Bailey, “A Critical Analysis of Vulnerability Taxonomies”,
Technical Report CSE-96-11, Dept. of Computer Science, University of California at
主屏幕按钮 Davis, Davis, CA 95616-8562 (Sep. 1996).
[4] 微软安全中心.
/china/technet/curity/default.mspx
[5] FrSIRT. /english/index.php
[6] 国际CVE标准. www.cve.mitre
[7] Mitre Corporation. Common Vulnerabilities and Exposures. Available from
cve.mitre/ , accesd 2003.
[8] Wenliang Du,Aditya P. Mathur. Vulnerability Testing of Software System Using
Fault Injection.Coast TR 98-02, 1998.不定式是什么
[9] CVSS. www.first/cvss/.
[10] Matt Blaze. 2002 September 15 (Preprint, revid 2003 March 02). Cryptology
and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. IEEE
Security and Privacy (March/April 2003).
[11] Steven M. Christey and Chris Wysopal. 2002 February 12 (Expired 2002 August
12). Responsible Vulnerability Disclosure Process (Internet-Draft RFC).
徐庶读音
[12] Computer Emergency Respon Team/Coordination Center. 2000 October 09.
CERT/CC Vulnerability Disclosure Policy.
[13] Computer Emergency Respon Team/Coordination Center. 2003. CERT/CC咳嗽吃什么药效果好
Vulnerability Metric.
[14] Russ Cooper. 2001. Proposal – The Responsible Disclosure Forum.
媵嫱 [15] Dennis Fisher. 2003 November 18. “Security Rearcher Calls for Vulnerability
Trade Association.” eWeek.
归念 [16] Daniel E. Geer, Jr. (Editor), Dennis Devlin, Jim Duncan, Jeffrey Schiller, and Jane
Winn. 2002 Third Quarter. “Vulnerability Disclosure.” Secure Business Quarterly.
[17] Daniel E. Geer, Jr. (Editor), Mary Ann Davidson, Marc Donner, Lynda McGhie,
and Adam Shostack. 2003 Second Quarter. “Patch Management.” Secure Business Quarterly.
[18] Tiina Havana. 2003 April. Communication in the Software Vulnerability
Reporting Process. M.A. thesis, University of Jyvaskyla.
[19] Internet Security Systems. 2002 November 18 (Revid). X-Force™ Vulnerability
Disclosure Guidelines.
[20] Elias Levy. 2001 October 21. “Security in an Open Electronic Society.”
SecurityFocus.
[21] Microsoft Corporation. 2002 November (Revid). Microsoft Security Respon
他来了请闭眼小说
Center Security Bulletin Severity Rating System.
[22] Marcus Ranum. 2000 October. “The Network Police Blotter – Full Disclosure is
Bogus.” ;login:The Magazine of USENIX & SAGE. Volume 25, no. 6: 47-49.
[23] Krsul V.Software Vulnerability Analysis.Department of Computer Sciences,
Purdue University, 1998
[24] @Stake. 2002 June 05. Security Vulnerability Reporting Policy. Available from
/rearch/policy/ , accesd 2003.
[25] William A. Arbaugh, William L. Fithen, and John McHugh. 2000 December.
Windows of Vulnerability: A Ca Study Analysis. IEEE Computer.
[26] Ross Anderson. 2001. Security Engineering: A Guide to Building Dependable
Distributed Systems. John Wiley & Sons. ISBN: 0-471-38922-6.
[27] Matt Bishop. 2003. Computer Security: Art and Science. Addison-Wesley
Professional. ISBN: 0-201-44099-7.
[28] Matt Bishop. 1999 September. Vulnerabilities Analysis. Proceedings of the
Second International Symposium on Recent Advances in Intrusion Detection.
[29] 单国栋, 戴英侠, 王航. 计算机漏洞分类研究. 计算机工程,2002,28(10):3-6
[30] 夏云庆 编著 Visual C++ 6.0 数据库高级编程 北京希望电子出版社
[31] 段钢 编著 加密与解密(第二版) 电子工业出版社
[33] 候俊杰 著 深入浅出MFC 第2 版 华中科技大学出版社
[34] Applied Microsoft Framework Programming (美) Jeffrey Richter 著 清华
大学出版社
[35] National Vulnerability Databa v
[36] US-CERT Vulnerability Notes. /vuls
[37] SecurityFocus.
小211
[38] Internet Security Systems – X-Force Databa.
[39] 孙凤宏. 探索未来计算机技术发展与应用[J]. 青海统计, 2007,(11) .
[40] 蔡芝蔚. 计算机技术发展研究[J]. 电脑与电信, 2008,(02) .
[41] 文德春. 计算机技术发展趋势[J]. 科协论坛(下半月), 2007,(05) .
[42] 姚正. 计算机发展趋势展望[J]. 商情(教育经济研究), 2008,(01) .
[43]《计算机研究与发展》简介[J]. 计算机研究与发展, 2008,(01) .
[44] 许封元. 计算机发展趋势[J]. 农业网络信息, 2006,(08) .
[45] 陈相吉. 未来计算机与计算机技术的发展[J]. 法制与社会, 2007,(10) .
[46] 何文瑶. 计算机技术发展态势分析[J]. 科技创业月刊, 2007,(05) .