-
2
-
-
0028514027
-
A Taxonomy of Computer Security Flaws
-
September, Pages
-
C. Landwehr, A. Bull, John P. McDermott, and W. Choi, "A Taxonomy of Computer Security Flaws," ACM Computing Surveys, Vol. 26, No. 3, September 1994, Page(s): 211-254.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.1
Bull, A.2
McDermott, J.P.3
Choi, W.4
-
6
-
-
0034593275
-
Quality of Security Services
-
ISBN: 1-58113-260-3, February, Pages
-
C. Irvine, T. Levin, "Quality of Security Services", ACM Proceedings of the 2000 workshop on New security paradigms, ISBN: 1-58113-260-3, February 2001, Page(s): 91-99.
-
(2001)
ACM Proceedings of the 2000 workshop on New security paradigms
, pp. 91-99
-
-
Irvine, C.1
Levin, T.2
-
7
-
-
33847644538
-
-
Special Publication No. 800-33, December, Also available at
-
National Institute of Standards and Technology (NIST), "Underlying Technical Models for Information, Technology Security", Special Publication No. 800-33, December 2001. Also available at http://csrc.nist.gov/publications/ nistpubs/800-33/sp800-33.pdf
-
(2001)
Underlying Technical Models for Information, Technology Security
-
-
-
8
-
-
39049101426
-
-
Open Source Security Testing Methodology Manual Pitfalls (OSSTMM), Version 2.5, August 2003, available at http://ideahamster.org/projects/osstmm. htm.
-
Open Source Security Testing Methodology Manual Pitfalls (OSSTMM), Version 2.5, August 2003, available at http://ideahamster.org/projects/osstmm. htm.
-
-
-
-
9
-
-
39049145734
-
-
Common Criteria (CC) project report, Common Criteria for Information Technology Security Evaluation, August 1999, available at http://www.commoncriteria.org/.
-
Common Criteria (CC) project report, "Common Criteria for Information Technology Security Evaluation", August 1999, available at http://www.commoncriteria.org/.
-
-
-
-
11
-
-
0006917446
-
Internet privacy
-
February, Pages
-
L. Cranor, Internet privacy, Communications of the ACM, February 1999, Volume 42, Issue 2, Page(s) 28-38.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 28-38
-
-
Cranor, L.1
-
12
-
-
0003531721
-
An Analysis of Security Incidents on the Internet
-
Ph.D. Thesis, Pittsburgh, USA, Also available at
-
John D. Howard, "An Analysis of Security Incidents on the Internet", Ph.D. Thesis, Carnegie Mellon University, Pittsburgh, USA, 1997. Also available at http://www.cert.org/research/JHThesis/Word6/
-
(1997)
-
-
Howard, J.D.1
-
13
-
-
0021425586
-
Can Computer Crime Be Stopped?
-
T. Perry and P. Wallich, "Can Computer Crime Be Stopped?", IEEE Spectrum, Vol. 21, No. 5.
-
IEEE Spectrum
, vol.21
, Issue.5
-
-
Perry, T.1
Wallich, P.2
-
14
-
-
39049138419
-
-
Addison -Wesley, Great Britain, Pages
-
James Essinger, "Internet Trust and Security", Addison -Wesley, Great Britain 2001, Page(s): 23-43.
-
(2001)
Internet Trust and Security
, pp. 23-43
-
-
Essinger, J.1
|