其他1. | 樊國楨、楊晉寧(1996)。互連網(Internet)電子信息交換安全--以電子公文交換作業安全為本,台北:電腦稽核。 延伸查詢![new window](/gs32/images/newin.png) |
2. | Chapman, D. B. ; Zwicky, E. D.(1995)。Building Internet Firewalls,O’Reilly & Associates, Inc.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
3. | Courtney, R.(1977)。Security Risk Assessment in Electronic Data Processing,Arlington, Va.:AFIPS。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
4. | Department of Defense(1985)。Trusted Computer System Evaluation Criteria。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
5. | Fisher, R.(1984)。Information Systems Security,Prentice-Hall, New Jersey:Englewood Cliffs。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
6. | Holmes, E. M. ; Kurt, J. E.(1996)。A Methodology for Managing Information - Based Risk。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
7. | Hoyt, D.(1973)。Computer Security Handbook,New York:Macmillan。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
8. | Kabay, M. E.(1996)。The NCSA Guide to Enterprise Security,McGraw-Hill。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
9. | Karen, D. L. ; Houston, H. C. ; Mellerrill, E. W.(1992)。hreates to Information Systems : Today’s Reality﹐Yesterday’s Understanding。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
10. | Krauss, L.(1972)。SAFE: Security Audit and Field Evaluation for Computer Facilities and Information Systems,Amacon。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
11. | Richard, B.(199312)。nformation System Security Design Methods: Implications for Information System Development。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
12. | Ryan , S. D. ; Bordoloi, B.(1997)。Evaluating security threats in mainframe and client/server environments。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
13. | Simson, G. ; Gene, S.(1991)。Practical UNIX Security,O’Reilly & Associates, Inc.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
14. | Smith, M.(198910)。Computer Security- Threats, Vulnerabilities and Countermeasures。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
15. | Wang, P.(1994)。Information System Management Issues in the Republic of China for the 1990s。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
16. | Yang﹐H. L.(1996)。Key Information Management Issues in Taiwan and the US。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |