24/05/2018, 19:21
Tài liệu tham khảo-Bảo mật máy tính
1. Dieter Gollmann. (1999). Computer Security. John Wiley & Sons, Inc. 2. James, F.K. and Keith, W.R. (2003). Computer Networking: A Top-Down Approach Featuring the Internet. Pearson Education, Inc. ...
1. | Dieter Gollmann. (1999). Computer Security. John Wiley & Sons, Inc. |
2. | James, F.K. and Keith, W.R. (2003). Computer Networking: A Top-Down Approach Featuring the Internet. Pearson Education, Inc. |
3. | Pierre Bieber and Fre’de’ric Cuppens. (2001). Expression of Confidentiality Policies with Deontic Logic. John Wiley & Sons, Inc. |
4. | Zhiqing Liu. (2001). Manage Component-Specific Access Control with Differentiation and Composition. Retrieved April 2005, from Indiana University, website: http://www.cs.iupui.edu/~zliu/doc/policy.pdf. |
5. | Matthew J.Herholtz. (2001). Java’s Evolving Security Model: Beyond the Sandbox for Better Assurance or Murkier Brew?. Retrieved May 2005, from Sans Institute, website:http://www.giac.org/practical/gsec/Matthew Herholtz GSEC.pdf. |
6. | OWASP Project. (2001). A Guide to Building Secure Web Applications. Retrieved may 2005, from http://www.cgisecurity.com/owasp/html/ch08s03.html |
7. | Prasad G. Naldurg. (2004). Modelling insecurity: Enabling recovery-oriented security with dynamic policies. Retrieved May 2005, from University of Illinois at Urbana-Champaign, website:http://www.cs.uiuc.edu/Dienst/Repository/2.0/Body/ncstrl.uiuc_cs/UIUCDCS-R-2004-2378/postscript.pdf |
8. | Dung. P.M. (2005). Computer Security. (Lecture notes, Course No AT70.13, School of Advanced Technology). Asean Institute of Technology. |
9. | Bell D.E. and LaPadula L.J. (1976). Secure computer system: unified exposition and Multics interpretation. The Mitre Corporation. |
10. | Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47. |
11. | Stinson, D.R. (1995). Cryptography: Theory and Practice. CRC Press, Inc. |
12. | William Stallings. (1999). Cryptography and Network Security: Principles and Practice. Prentice Hall, Inc. |
13. | Phan Đình Diệu. (2002). Lý thuyết mật mã và an toàn thông tin. NXB ĐHQG Hà Nội. |
14. | Aptech Limited. (2000). Concepts of E-commerce. Aptech certified E-commerce program. India: Author. |
15. | Ngô Anh Vũ. (1999). Virus tin học – Huyền thoại và thực tế. NXB Thành phố Hồ Chí Minh. |
16. | Nguyễn Viết Linh và Đậu Quang Tuấn. (2001). Hướng dẫn phòng chống Virus trong tin học một cách hiệu quả. NXB Trẻ. |
17. | Nguyễn Mạnh Giang. (2005). Lập trình bằng ngôn ngữ Assembly cho máy tính IBM-PC. (Tái bản lần 3). NXB Giáo dục. |
18. | Nguyễn Đình Hân. (2005). Bảo mật: Chung sống với mã ngoại lai. Thế giới vi tính – PC World Viet Nam, Sê-ri A - Công nghệ máy tính và mạng, 147, 102-104. |
19. | Philip W. L. Fong.(2004). Proof Linking: A Modular Verification Architecture for Mobile Code Systems. (PhD Dissertation No V5A 1S6, School of Computing Science, Simon Fraser University, Burnaby, BC, Canada). Retrieved May 2005, from http://www2.cs.uregina.ca/~pwlfong/Pub/dissertation.pdf |
20. | Valentin Razmov. (2002). Security in Untrusted Code Environments: Missing Pieces of the Puzzle. Retrieved May 2005, from University of Washington, website:http://www.cs.washington.edu/homes/valentin/papers/Security-UntrustedCode.pdf |
21. | Sean Boran. (2002). The IT Security Cookbook. Retrieved May 2005, fromhttp://www.secinf.net/misc/the_it_security_cookbook/the_it_security_cookbook_securing_applications_.html |
22. | Satish R., Venkata R., Balaji T., Govindakrishnan K., Rajneesh M., Nilest P. and Sravan K. (2002). Security of Mobile Code. Retrieved April 2005, from University of Kentucky, website:http://cs.engr.uky.edu/~singhal/term-papers/Mobilecode.pdf |
23. | Tobias Fuchs. (2004). Proof-Carrying Code. Retrieved April 2005, from University of Muenchen, website:http://wwwbrauer.in.tum.de/seminare/security/SS04/fuchs-paper.pdf |
24. | Frederick B. Cohen. (1991). A Cryptographic Checksum for Integrity Protection. Computers and Security, 6(6), 505-510. |
25. | Frederick B. Cohen. (1991). Trends In Computer Virus Research. Retrieved May 2005, from http://all.net/books/integ/japan.html |
26. | Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer. (1996). A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker. Retrieved May 2005, from University of California, Bereley, website:http://www.cs.berkeley.edu/~daw/papers/janus-usenix96.ps. |
27. | Guy Edjlali, Anurag Acharya and Vipin Chaudhary. (1998). History-based Access Control for Mobile Code. Retrieved April 2005, from:http://www.pdcl.eng.wayne.edu/~vipin/papers/deeds.ps. |
28. | Frederick B. Cohen. (1994). A Short Course on Computer Viruses. (Second Edition). John Wiley & Sons, Inc. |
29. | Nguyễn Đình Hân. (2005). Các chiến lược chống Virus. Thế giới vi tính – PC World Viet Nam, Sê-ri A - Công nghệ máy tính và mạng, 150, 108-110. |
30. | Pavan Verma. (2005). Virus Protection. Retrieved May 2005, from EECS Department, University of Michigan, website:http://vx.netlux.org/lib/pdf/Virus Protection.pdf |
31. | Wayner A. Jansen. (2001). Guidelines on Active Content and Mobile Code. Retrieved May 2005, from National Institute of Standard and Technology, U.S. Department of Commerce, website: http://csrc.nist.gov/publications/nistpubs/800-28-ver2/SP800-28v2.pdf |