| 期刊論文1. | Bruce, S.(1999)。The Trojan Horse Race。Communications of The ACM,42(9),45。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Cusumano, M.、Selby, R.(1997)。How Microsoft Builds Software。CACM,40(6),53-61。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 學位論文1. | 高大宇(2001)。網路駭客與惡意程式入侵之偵查研究。中央警察大學。 延伸查詢![new window](/gs32/images/newin.png) | 圖書1. | Denning, D. E.(1999)。Information Warfare and Security。New York, NY:Addsion- Wesley Longman. Inc。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Casey, Eoghan(2000)。Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet。London:Academic Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Anonymous(1998)。Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Denning, E. D.、Denning, P. J.(1998)。Internet Besieged-Countering Cyberspace Scofflaws。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Donn, B. P.(1998)。Fighting Computer Crime-A New Framework for Protecting Information。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Douglas, T.、Brian D. L.(2000)。Cybercrime-Law Enforcement, Security and Surveillance in The Information Age。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Waltz, Edward(1998)。Information Warfare Principles and Operations。Artech House Publications。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Grabosky, P.、Smith, R. G.(1997)。Crime in Digital Age: Controlling Telecommunications and Cyberspace Illeagalities。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Kenneth, S. R.(1996)。High-Technology Crime-Investigating Cases Involving Computers。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Taylor, Paul A.(1999)。Hackers-Crime in the Digital Sublime。Routledge Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Chiu, J.。Birdman's Happy Coding。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | (2001)。Doshelp Intrusion and Attack Reporting Center。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | (2001)。Graphics Accelerator Trojan Horse/Virus Alert。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Remote Control PC 2000(2000)。The Most Powerful PC Monitoring Software on the Internet, Formerly Known as NETSPY。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Subseven Official Website(2000)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |