《网络安全体系结构》一2.5 参考资料

    xiaoxiao2023-07-07  151

    本节书摘来自异步社区《网络安全体系结构》一书中的第2章,第2.5节,作者【美】Sean Convery,更多章节内容可以访问云栖社区“异步社区”公众号查看

    2.5 参考资料

    网络安全体系结构

    Analysts: Egghead’s inquiry cost millions. http://zdnet.com.com/2100-11-527001.html?legacy=zdnn Fraser, B. RFC 2196, Site Security Handbook. http://www.ietf.org/rfc/rfc2196.txt Guel, Michele D. A Short Primer for Developing Security Policies. http://www.sans.org/ newlook/resources/policies/Policy_Primer.pdfHackers break in N.Y. Times Web site. http://www.cnn.com/TECH/computing/9809/13/nyt.hacked/ Insecure.org. http://www.insecure.org Moore, A., R. Ellison, and R. Linger. Attack Modeling for Information Security andSurvivability. Technical note CMU/SEI-2001-TN-001. http://www.cert.org/archive/pdf/01tn001.pdf Nessus Vulnerability Scanner. http://www.nessus.org Packetstorm Security. http://www.packetstormsecurity.org SecurityFocus. http://www.securityfocus.com
    最新回复(0)