-
1
-
-
0011312585
-
Fault-Tolerant Telecommunication System Patterns
-
J. M. Vlissides, J. O. Coplien, and N. L. Kerth, eds, Addison-Wesley, Reading, MA
-
M. E. Adams, J. O. Coplien, R. J. Gamoke, R. S. Hanmer, F. Keeve, and K. L. Nicodemus, "Fault-Tolerant Telecommunication System Patterns," Pattern Languages of Program Design 2 (J. M. Vlissides, J. O. Coplien, and N. L. Kerth, eds.), Addison-Wesley, Reading, MA, 1996, pp. 549-573.
-
(1996)
Pattern Languages of Program Design
, vol.2
, pp. 549-573
-
-
Adams, M.E.1
Coplien, J.O.2
Gamoke, R.J.3
Hanmer, R.S.4
Keeve, F.5
Nicodemus, K.L.6
-
2
-
-
12344308304
-
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Trans. Dependable and Secure Computing, 1:1 (2004), 11-33.
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, 1:1 (2004), 11-33.
-
-
-
-
3
-
-
36649037606
-
-
B. Blakley, C. Heath, and Members of the Open Group Security Forum, Security Design Patterns, Tech. Guide, Apr. 2004,
-
B. Blakley, C. Heath, and Members of the Open Group Security Forum, "Security Design Patterns," Tech. Guide, Apr. 2004,
-
-
-
-
4
-
-
84879607117
-
-
Federal Communications Commission
-
Federal Communications Commission, "Network Outage Reporting System (NORS)," 〈http://www.fcc.gov/oet/outage/〉.
-
Network Outage Reporting System (NORS)
-
-
-
5
-
-
0003880013
-
-
Addison-Wesley, Reading, MA
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, Reading, MA, 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
7
-
-
33750349219
-
Documenting Architectures with Patterns
-
R. S. Hanmer and K. F. Kocan, "Documenting Architectures with Patterns," Bell Labs Tech. J. 9:1 (2004), 143-163.
-
(2004)
Bell Labs Tech. J
, vol.9
, Issue.1
, pp. 143-163
-
-
Hanmer, R.S.1
Kocan, K.F.2
-
8
-
-
28044457328
-
-
International Organization for Standardization and International Electrotechnical Commission, ISO/IEC, June 15, 17799:2005
-
International Organization for Standardization and International Electrotechnical Commission, "Information Technology-Security Techniques-Code of Practice for Information Security Management," ISO/IEC 17799:2005, June 15, 2005, 〈http://www.iso.org〉.
-
(2005)
Information Technology-Security Techniques-Code of Practice for Information Security Management
-
-
-
9
-
-
36649024360
-
-
International Organization for Standardization and International Electrotechnical Commission, Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model - Part 2: Security Functional Requirements - Part 3: Security Assurance Requirements, Common Criteria, ISO/IEC 15408-1:2005, Sep. 22, 2005, 〈http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNU MBER= 40612〉.
-
International Organization for Standardization and International Electrotechnical Commission, "Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model - Part 2: Security Functional Requirements - Part 3: Security Assurance Requirements, Common Criteria," ISO/IEC 15408-1:2005, Sep. 22, 2005, 〈http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER= 40612〉.
-
-
-
-
10
-
-
36649016886
-
-
International Organization for Standardization and International Electrotechnical Commission, Information Technology - Security Techniques-IT Network Security - Part 2: Network Security Architecture, ISO/IEC 18028-2, Feb. 2006, 〈http://www.iso.org/iso/en/CatalogueDetailPage. Catalogue Detail?CSNUMBER=40009〉.
-
International Organization for Standardization and International Electrotechnical Commission, "Information Technology - Security Techniques-IT Network Security - Part 2: Network Security Architecture," ISO/IEC 18028-2, Feb. 2006, 〈http://www.iso.org/iso/en/CatalogueDetailPage. Catalogue Detail?CSNUMBER=40009〉.
-
-
-
-
11
-
-
36649027113
-
-
International Telecommunication Union, Telecommunication Standardization Sector, TMN Management Functions, ITU-T Rec. M.3400, Feb. 2000, 〈http://www.itu.int〉.
-
International Telecommunication Union, Telecommunication Standardization Sector, "TMN Management Functions," ITU-T Rec. M.3400, Feb. 2000, 〈http://www.itu.int〉.
-
-
-
-
12
-
-
36649014691
-
-
International Telecommunication Union, Telecommunication Standardization Sector, Security Architecture for Systems Providing End-to-End Communications, ITU-T Rec. X.805, Oct. 2003, 〈http://www.itu. int〉.
-
International Telecommunication Union, Telecommunication Standardization Sector, "Security Architecture for Systems Providing End-to-End Communications," ITU-T Rec. X.805, Oct. 2003, 〈http://www.itu. int〉.
-
-
-
-
13
-
-
36649005343
-
-
International Telecommunication Union, Telecommunication Standardization Sector, Security for the Management Plane: Security Requirements, ITU-T Rec. M.3016.1, Apr. 2005, 〈http://www.itu.int〉.
-
International Telecommunication Union, Telecommunication Standardization Sector, "Security for the Management Plane: Security Requirements," ITU-T Rec. M.3016.1, Apr. 2005, 〈http://www.itu.int〉.
-
-
-
-
14
-
-
33745883571
-
Software Security is Software Reliability
-
F. Lindner, "Software Security is Software Reliability," Commun. ACM, 49:6 (2006), 57-61.
-
(2006)
Commun. ACM
, vol.49
, Issue.6
, pp. 57-61
-
-
Lindner, F.1
-
15
-
-
36649022653
-
-
QuEST Forum, TL 9000 Quality Management System Requirements Handbook, Book 1, Release 3.0, American Society for Quality, Milwaukee, WI, 2001
-
QuEST Forum, TL 9000 Quality Management System Requirements Handbook, Book 1, Release 3.0, American Society for Quality, Milwaukee, WI, 2001.
-
-
-
-
16
-
-
0038546179
-
-
L. Rising ed, Cambridge University Press, Cambridge
-
L. Rising (ed.), Design Patterns in Communications Software, Cambridge University Press, Cambridge, 2001.
-
(2001)
Design Patterns in Communications Software
-
-
-
17
-
-
33750050331
-
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering, John Wiley and Sons, Chichester, Eng., 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering, John Wiley and Sons, Chichester, Eng
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
19
-
-
70349462879
-
-
H. F. Tipton and K. Henry eds, Auerbach, Boca Raton, FL
-
H. F. Tipton and K. Henry (eds.), Official (ISC)2 Guide to the CISSP CBK, Auerbach, Boca Raton, FL, 2006.
-
(2006)
Official (ISC)2 Guide to the CISSP CBK
-
-
|