参考文献
|
-
樊國楨(2010)。資訊安全護理之二:可信賴網路接取。資訊安全通訊,16(2),1-18。
連結:
-
樊國楨(2011)。資訊安全護理之三:資訊安全管理系統的連續性稽核初探。資訊安全通訊,17(2),3-26。
連結:
-
樊國楨(2010)。資訊安全護理之一:終端護理。資訊安全通訊,16(1),4-25。
連結:
-
ISO (2011) Information technology – Security techniques – Secure software development and evaluation under ISO/IEC 15408 and ISO/IEC 18405, ISO/IEC WD 20004:2011-01-15..
-
White House (2002) The National Strategy to Secure Cyberspace..
-
http://www.dhs.gov/ (2010-11-30).
-
Davidson, D. (2010) US Comprehensive National Cybersecurity Initiative – Supply Chain Risk Management (Understanding the Challenges from Outsourcing) (Presentation)..
-
ISO (2010) Information technology – Programming languages – Guidance to avoiding vulnerabilities in programming languages though language selection and use, ISO/IEC TR 24772:2010-10-01..
-
http://www.csrc.nist.gov/ (2010-11-30).
-
Frederick, Cynthia ed. (2002) Information Assurance Technical Framework 3.1, National Security Agency..
-
ISO (2010) Information technology – Security techniques – Vulnerability disclosure, ISO/IEC CD 29147:2010-06-10..
-
http://www.whitehouse.gov/omb/ (2010-11-30).
-
樊國楨 (2010) 資訊安全實作初探:根基於美國聯邦資訊安全管理法計畫(未發表)
-
https://build.ecurityin.us-cert.gov/swa/measurable.html (2010-03-09).
-
Terada, M. (2011) Breifing: SCAP Activities in Japan (Presentation), Security Automation Developer Days – Spring 2011, 22~25, 2011, NIST..
-
Davidson, D. (2011) Point Paper, Federal Agencies' Engagement in Standards, 2011-03-06..
-
Dempsey, K.(2010).NIST Special Publication 800-137NIST Special Publication 800-137,未出版
-
Martin, R. A.(2009).Making Security Measurable and manageable.Cross Talk: The Journal Defense Software Engineering,September/October
-
Martin, R. A.(2005).Transformational Vulnerability Management Through Standards.Cross Talk: The Journal Defense Software Engineering,May
-
Office of Management and Budget(2011).,未出版
-
吳亞非(2011)。美國聯邦桌面配置中國政務終端核心配置研究。2011資訊安全管理與服務論壇,臺北市:
|