2.5 参考资料
网络安全体系结构
- Analysts: Egghead’s inquiry cost millions. http://zdnet.com.com/2100-11-527001.html?legacy=zdnn
- Fraser, B. RFC 2196, Site Security Handbook. http://www.ietf.org/rfc/rfc2196.txt
- Guel, Michele D. A Short Primer for Developing Security Policies. http://www.sans.org/
- newlook/resources/policies/Policy_Primer.pdf
- Hackers break in N.Y. Times Web site. http://www.cnn.com/TECH/computing/9809/13/nyt.hacked/
- Insecure.org. http://www.insecure.org
- Moore, A., R. Ellison, and R. Linger. Attack Modeling for Information Security andSurvivability. Technical note CMU/SEI-2001-TN-001. http://www.cert.org/archive/pdf/01tn001.pdf
- Nessus Vulnerability Scanner. http://www.nessus.org
- Packetstorm Security. http://www.packetstormsecurity.org
- SecurityFocus. http://www.securityfocus.com
时间: 2024-10-14 14:53:15