其他1. | 戰國策(2006)。網路交易:收付款快易通,旗標出版股份有限公司。 延伸查詢![new window](/gs32/images/newin.png) |
2. | 范俊逸等(2005)。電子付款系統簡介,財團法人國家實驗研究院科技政策研究與資訊中心。 延伸查詢![new window](/gs32/images/newin.png) |
3. | 台灣票據交換所(20070603)。電子票據處理流程。 延伸查詢![new window](/gs32/images/newin.png) |
4. | 廖玉蓮(2000)。電子商務付款的安全與現況。 延伸查詢![new window](/gs32/images/newin.png) |
5. | 富士 Chimera 總研(2006)。日本網路購物之線上付款平台現況分析,資策會市場情報中心研究報告。 延伸查詢![new window](/gs32/images/newin.png) |
6. | 東吳大學法律系(2005)。電子金融服務與付款機制電子化管理規範研究。 延伸查詢![new window](/gs32/images/newin.png) |
7. | Abrazhevich, D.(2001)。Classification and Characteristics of Electronic Payment System。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
8. | Arkin, B.(2005)。Software Penetration Testing。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
9. | Bohle, K.(2001)。Payment Culture Matters: A Comparative EU-US Perspective on Internet Payments。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
10. | BSI(2006)。Information Security Manage¬ment Systems - Part 3: Guidelines for Information Security Risk Management,。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
11. | Chaum, D.(1983)。Blind Signatures for Untraceable Payment。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
12. | Chess, B.(2004)。Static Analysis for Security。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
13. | Dowd, M., J. McDonald, and J. Schuh(2006)。The Art of Software Security Assessment,Addision Wesley。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
14. | Hope, P.(2004)。Misuse and Abuse Cases: Getting Past the Positive。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
15. | ISO/IEC(2005)。Information Technology - Security Techniques - Information Security Management Systems - Code of Practice for Information Security Management。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
16. | ISO/IEC(2000)。Information Technology - Security Techniques - Management of Information and Communications Technology Security - Part 4: Selection of Safeguards。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
17. | Kahate, A.(2003)。Cryptography and Network Security,McGraw-Hill。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
18. | McGraw, G.(2006)。Software Security - Building Security,Addision-Wesley Software Security Series。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
19. | McGraw, G.(2004)。Software Security,。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
20. | Reid, P.(2004)。Biometrics for Network Security,Prentice HALL。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
21. | Serrao, C.(2003)。E-Commerce Payment Systems - An Overview。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
22. | Wayner, P.(1997)。Digital Cash: Commerce on the Net, 2nd Edition,Academic Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |