메뉴 건너뛰기




Volumn 17, Issue 1, 2000, Pages

Internet and network security

Author keywords

Administration; Internet; Legal Issues; Management

Indexed keywords

ACCESS CONTROL; NETWORK SECURITY; SECURE ELECTRONIC TRANSACTION (SET); SECURE SOCKET LAYER (SSL);

EID: 3242801344     PISSN: 08826404     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (2)

References (13)
  • 1
    • 84862404376 scopus 로고    scopus 로고
    • Security technologies
    • June 17
    • Cisco Systems. (1999, June 17). Security technologies [WWW document]. URL http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/security.htm.
    • (1999) WWW Document
  • 2
    • 84862399875 scopus 로고    scopus 로고
    • Network security for securities and investment institutions
    • March 5
    • Cisco Systems. (1999, March 5). Network security for securities and investment institutions [WWW document]. URL http://www.cisco.com/warp/public/cc/ sol/mkt/ent/inds/fin/netsc_sd.htm.
    • (1999) WWW Document
  • 3
    • 84862396163 scopus 로고    scopus 로고
    • Security overview
    • Cisco Systems. (1997). Security Overview [WWW document]. URL http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/ secur_c/scoverv.htm.
    • (1997) WWW Document
  • 4
    • 84862396455 scopus 로고    scopus 로고
    • Worldwide internet users, 1998-2003
    • eMarketer
    • eMarketer. (1998). Worldwide Internet Users, 1998-2003. [WWW document]. URL http://www.emarketer.com/estats/selleglob.html.
    • (1998) WWW Document
  • 5
    • 84862400906 scopus 로고    scopus 로고
    • How SSL works
    • Netscape Communications. (1999). How SSL works [WWW document]. URL http://developer.netscape.com/tech/security/ssl/howitworks.html.
    • (1999) WWW Document
  • 6
    • 84862402440 scopus 로고    scopus 로고
    • Glossary
    • RSA Data Security. (1998). Glossary [WWW document]. URL http://www.rsa.com/rsalabs/faq/html/glossary.html.
    • (1998) WWW Document
  • 8
    • 84862400467 scopus 로고    scopus 로고
    • Introduction to cryptography
    • SSH Communications Security. (1999). Introduction to Cryptography [WWW document]. URL http://www.ssh.fi/tech/crypto/intro.html.
    • (1999) WWW Document
  • 10
    • 84862395479 scopus 로고    scopus 로고
    • How to develop a network security policy
    • Sun Microsystems. (1998). How to Develop a Network Security Policy [WWW document]. URL http://www.sun.com/security/sec.policy.wp.html.
    • (1998) WWW Document
  • 11
    • 84862400390 scopus 로고    scopus 로고
    • Mastering security on the internet for competitive advantage: Network security technologies
    • Sun Microsystems. (1999). Mastering Security on the Internet for Competitive Advantage: Network Security Technologies [WWW document]. URL http://www.sun.com/security/wp-mastering.sec/intro.html.
    • (1999) WWW Document
  • 12
    • 84862393639 scopus 로고    scopus 로고
    • Orange book parts I and II: The criteria and rationale and guidelines: A guideline on configuring mandatory access
    • United States Department of Defense. (1996). Orange Book Parts I and II: The Criteria and Rationale and guidelines: A guideline on configuring mandatory access [WWW document]. URL http://www.ru.kernel.org/pub/linux/libs/security/ orange-linux/refs/orange/orange-II-9.html.
    • (1996) WWW Document


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.