| 期刊論文1. | Rees, J.、Bandyopadhyay, S.、Spafford, E. H.(2003)。PFIRES: A Policy Framework for Information Security。Communications of the ACM,46(7),101-106。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Power, R.(2002)。2002 CSI/ FBI Computer Crime and Security Survey。Computer Security Journal,8(1),1-24。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Anderson, J. M.(2003)。Why We Need a New Definition of Information Security。Computers & Security,22(4),308-313。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Bellovin, S. M.(1989)。Security Problems in the TCP/ IP Protocol Suite。Computer Communication Review,19(2),32-48。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Bianco, D.(2003)。Insider Risk: Who Do You Trust?。Information Security,6(10),44-54。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Briney, A.、Prince, F.(2003)。Security Survey: Disciplined Security。Information Security,6(10),56-64。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Denning, P. J.、Brandin, D. H.、Schwartz, D. C.、Davida, G. I.(1981)。Report of the Public Cryptography Study Group。Communications of the ACM,24(7),435-450。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Frantzen, M.、Kerschbaum, F.、Schultz, E.、Fahmy, S.(2001)。A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals。Computers & Security,20(3),263-270。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Hayashi, K.、Sueyoshi, T.(1994)。Information Infrastructure Development: International Comparison Between the United States and Japan。Telematics and Informatics,11(3),153-166。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Kamara, S.、Fahmy, S.、Schultz, E.、Kerschbaum, F.、Frantzen, M.(2003)。Analysis of Vulnerabilities I Internet Firewalls。Computers & Security,22(3),214-232。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Kent, Stephen(1989)。Comments on 'Security Problems in the TCP/ IP Protocol' Suite。Computer Communication Review,19(3),10-19。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | Landwehr, C. E.、Bull, A. R.、McDermott, J. P.、Choi, W. S.(1994)。A Taxonomy of Computer Program Security Flaws。ACM Computing Surveys,26(3),211-254。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 13. | McPhee, W. S.(1974)。Operating System Integrity in OS/ VS2。The IBM System Journal,13(3),230-252。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 14. | Neumann, P. G.(2003)。Information System Security Redux。Communications of the ACM,46(10)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 15. | Perry, T. S.、Wallich, P.(1984)。Can Computer Crime Be Stopped?。IEEE Spectrum,21(5),34-45。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 16. | Rash, M.(2003)。Firewalls: Doing It Yourself。Information Security,6(10),70-75。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 17. | Rosen, E. C.(1981)。Vulnerabilities of Network cCntrol Protocols: An Example。Computer Communication Review,11(3),10-16。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 18. | Venter, H. S.、Eloff, J. H. P.(2003)。A Taxonomy for Information Security Technologies。Computers & Security,22(4),299-307。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 19. | Whitman, M. E.(2003)。Enemy at the Gate: Threats to Information Security。Communications of the ACM,46(8),91-95。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Bishop, M.、Bailey, D.(1996)。A Critical Analysis of Vulnerability Taxonomies。沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Jayaram, N. D.、Morse, P. L. R.(1997)。Network Security - a Taxonomic View。沒有紀錄。28-30。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Ker, K.(1996)。Internet firewalls: Questions and Answers。沒有紀錄。65-77。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Kumar, S.、Spafford, E. H.(1994)。A Pattern Matching Model for Misuse Intrusion Detection。沒有紀錄。11-21。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Lindqvist, U.、Jonsson, E.(1997)。How to Systematically Classify Computer Security Intrusions。Gothenburg, Sweden。154-163。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Neumann, P. G.、Parker, D. B.(1989)。A Summary of Computer Misuse Techniques。沒有紀錄。396-407。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Parker, D. B.(1991)。Restating the Foundation of Information Security。Washington, DC。480-493。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Ristenbatt, M. P.(1988)。Methodology for Network Communication Vulnerability Analysis。沒有紀錄。493-499。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Straub, D. W.、Widom, C. S.(1984)。Deviancy by Bits and Bytes: Computer Abusers and Control Measures。Toronto, Canada。431-441。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Wilner, B. D.(1996)。Six Pitfalls in Firewall Deployment。沒有紀錄。78-86。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 研究報告1. | Howard, J. D.、Longstaff, T. A.(1998)。A Common Language for Computer Security Incidents。Livermore, CA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Abbott, R. P.、Chin, J. S.、Donnelley, J. E.、Konigsford, W. L.、Tokubo, S.、Webb, D. A.(1976)。Security Analysis and Enhancements of Computer Operating Systems。Washington, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Anderson, J. P.(1980)。Computer Security Threat Monitoring and Surveillance。Fort Washington, PA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Aslam, T.、Krsul, I.、Spafford, E. H.(1996)。Use of a Taxonomy of Security Faults。West Lafayette, IN。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Bisbey, R.、Hollingworth, D.(1978)。Protection Analysis: Final Report。Marina del Rey, CA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Konigsford, W. L.(1976)。A Taxonomy of Operating-System Security Flaws。CA, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Krsul, I. V.(1997)。Computer Vulnerability Analysis Thesis Proposal。West Lafayette, IN。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 學位論文1. | Aslam, T.(1995)。A taxonomy of Security Faults in the UNIX Operating Systems,West Lafayette, IN。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Howard, J. D.(1997)。An Analysis of Security Incidents on the Internet,Pittsburgh, PA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Krsul, I. V.(1998)。Software Vulnerability Analysis,West Lafayette, IN。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Kumar, S.(1995)。Classification and Detection of Computer Intrusion,West Lafayette, IN。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Richardson, T. W.(2001)。The Development of a Database Taxonomy of Vulnerabilities to Support the Study of Denial of Service Attacks,USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書1. | Schneier, B.(1996)。Applied Cryptography: Protocols, Algorithms, and Source Code in C。Applied Cryptography: Protocols, Algorithms, and Source Code in C。New York, NY:John Wiley & Sons。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Neumann, P. G.(1995)。Computer Related Risks。ACM Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Sun Tzu、Cleary, Thomas(1988)。The Art of War。Oxford, UK:Oxford University Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Ahuja, V.(1996)。Network and Internet Security。Network and Internet Security。MA, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Amoroso, E. G.(1994)。Fundamentals of Computer Security Technology。Fundamentals of Computer Security Technology。沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Anonymous(1998)。Maximum Security - a Hacker's Guide to Protecting Your Internet Site and Network。Maximum Security - a Hacker's Guide to Protecting Your Internet Site and Network。Indiana, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Beizer, B.(1990)。Software Testing Techniques。Software Testing Techniques。New York, NY。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Bishop, M.(1996)。NISSC Panel on Vulnerabilities Data: The UC Davis Vulnerabilities Project。Classifying Vulnerabilities。沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Brinkley, D. L.、Schell, R. R.(1995)。What Is There to Worry about? An Introduction to the Computer Security Problem。Information Security: An Integrated Collection of Essays。Los Alamitos, CA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Burgess, M.(2000)。Principles of Network and System Administration。Principles of Network and System Administration。England。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Burstein, H.(1994)。Introduction to Security。Introduction to Security。NJ, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | Cameron, D.(1997)。Intranet Security。Intranet Security。South Carolina, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 13. | Ford, W.、Baum, M. S.(1997)。Secure Electronic Commerce: Building the Infrastructure for Digital Signatures & Encryption。Secure Electronic Commerce: Building the Infrastructure for Digital Signatures & Encryption。New Jersey, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 14. | Gasser, M.(1988)。Building a Secure Computer System。Building a Secure Computer System。New York, NY。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 15. | Kahn, D.(1967)。The Codebreakers: The Story of Secret Writing。The Codebreakers: The Story of Secret Writing。New York, NY。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 16. | Lynch, D. C.、Rose, M. T.(1993)。Internet System Handbook。Internet System Handbook。MA, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 17. | McDaniel, G.(1994)。IBM Dictionary of Computing。IBM Dictionary of Computing。New York, NY。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 18. | Parker, D. B.(1989)。Computer Crime: Criminal Justice Resource Manual。Computer Crime: Criminal Justice Resource Manual。沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 19. | Parker, D. B.(1997)。Computer Security Reference Book。Computer Security Reference Book。Florida, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 20. | Richardson, R.(2003)。CSI/ FBI Computer Crime and Security Survey。CSI/ FBI Computer Crime and Security Survey。USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 21. | Schwartau, W.(1996)。Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age。Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age。NY, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 22. | Security(1911)。Century Dictionary。Century Dictionary。沒有紀錄。 延伸查詢![new window](/gs32/images/newin.png) | 23. | Security(2000)。The American Heritage(r) Dictionary of the English Language。The American Heritage(r) Dictionary of the English Language。沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 24. | Stallings, W.(1995)。Network and Internetwork Security: Principles and Practice。Network and Internetwork Security: Principles and Practice。NJ, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 25. | Stein, L. D.(1998)。Web Security: A Step-by-Step Reference Guide。Web Security: A Step-by-Step Reference Guide。USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 26. | Zwicky, E. D.、Cooper, S.、Chapman, D. B.(2000)。Building Internet Firewall。Building Internet Firewall。CA, USA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Allen, J.(2002)。Firewalls and Proxies,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Beale, J.(2002)。Linux Firewalls and Their Advantages over Windows,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Cohen, F.(1996)。Internet Holes-Eliminating IP Address Forgery. Management Analytics,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Harrison, P.(2003)。Linux firewalls using iptables, Quick HOWTO-www.linuxhomenetworking.com,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Information(2002)。Merriam-Webster Online Dictionary,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Information(2003)。Wikipedia: The Free Encyclopedia,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Knight, E.(2000)。Computer Vulnerabilities,沒有紀錄。 延伸查詢![new window](/gs32/images/newin.png) | 8. | Marsh, R. T.(1997)。Critical Foundations: Protecting America's Infrastructures,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Schneier, B.(2002)。AES News. Crypto-Gram Newsletter,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | SOCKS(2002)。About SOCKS, Permeo Technologies,沒有紀錄。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |
| |