-
1
-
-
33845331997
-
The blended threat: Preventing computer security's new nemesis
-
NaSPA, June
-
Battinelli, C.: "The Blended Threat: Preventing Computer Security's New Nemesis," Technical Support Magazine, NaSPA, June 2003, http://www.naspa.com/PDF/2003/0603/T0306003.pdf
-
(2003)
Technical Support Magazine
-
-
Battinelli, C.1
-
2
-
-
33845319173
-
Distributed open proxy honeypots
-
Web Application Security Consortium
-
Barnett, R., et al.: "Distributed Open Proxy Honeypots," Web Application Security Consortium, Honeypots Project Page, http://www.webappsec. org/projects/honeypots/
-
Honeypots Project Page
-
-
Barnett, R.1
-
3
-
-
33845320087
-
The handshake between PKI and web services
-
December
-
Chang, S.: "The Handshake between PKI and Web Services," NATEA 2004 Journal, December 2004.
-
(2004)
NATEA 2004 Journal
-
-
Chang, S.1
-
4
-
-
0345529051
-
Managing security policy in a large distributed web services environment
-
November 3-6, 2003, Dallas, USA, IEEE Computer Society Press
-
Chang, S., et al.: "Managing Security Policy in a Large Distributed Web Services Environment," 27th Annual International Computer Software and Applications Conference (COMPSAC 2003), pp. 610-615, November 3-6, 2003, Dallas, USA, IEEE Computer Society Press, 2003.
-
(2003)
27th Annual International Computer Software and Applications Conference (COMPSAC 2003)
, pp. 610-615
-
-
Chang, S.1
-
5
-
-
33845296392
-
Pharming - A new technique for Internet fraud
-
March 07
-
Cuadra, F. De La: "Pharming - a new technique for Internet fraud," eChannelLine Canada, March 07, 2005, http://www.crime-research.org/ news/07.03.2005/1015
-
(2005)
eChannelLine Canada
-
-
De La Cuadra, F.1
-
6
-
-
40249101754
-
The security of applications: Not all are created equal
-
February
-
Jaquith, A.: "The Security of Applications: Not All Are Created Equal," @stake Research Report, February 2002, http://www. securitymanagement.com/library/atstake_tech0502.pdf
-
(2002)
@stake Research Report
-
-
Jaquith, A.1
-
8
-
-
0036273351
-
On Bricks and Walls: Why building secure software is hard
-
May
-
McGraw, G.: "On Bricks and Walls: Why Building Secure Software is Hard," Computers and Security, Volume 21, No. 3, pp 229-238, May 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.3
, pp. 229-238
-
-
McGraw, G.1
-
9
-
-
84962295060
-
Enlisting event patterns for cyber battlefield awareness
-
25-27 January, Hilton Head, South Carolina. IEEE Computer Society Press
-
Perrochon, L., Jang, E., Luckham, D. C.: "Enlisting Event Patterns for Cyber Battlefield Awareness." DARPA Information Survivability Conference & Exposition (DISCEX'00), 25-27 January 2000, Hilton Head, South Carolina. IEEE Computer Society Press.
-
(2000)
DARPA Information Survivability Conference & Exposition (DISCEX'00)
-
-
Perrochon, L.1
Jang, E.2
Luckham, D.C.3
-
12
-
-
33845344646
-
-
Giles, L. translated
-
Sun-Tzu (Giles, L. translated.) "The Art of War.", 1910. http://www.chinapage.com/sunzi-e.html
-
"The Art of War.", 1910
-
-
Sun-Tzu1
|