1 |
이기동, 김준우, '디지털 콘텐츠 정보보호를 위한 저작권 관리시스템 설계 및 구현', 경영정보학연구, 제13권, 제4호, 2003
|
2 |
Basie Von Solms, 'Information Security Governance: COBIT or ISO 17799 or Both?', Computer & Security, Vol. 24, 2005
|
3 |
Rajeev Nagar, 'Windows NT File System Internals : A Developer's Guide' O'Reilly & Associates, 1997
|
4 |
Lee, Y. H. and Hwang, D. J., 'Design and Implementation of Agent Based Dynamic Digital Rights Management', Journal of Information Processing Association, D. Vol. 8D, No.5, October 2001, pp. 613-622
과학기술학회마을
|
5 |
염근철, 이세정, '다양한 소프트웨어 개발환경에서의 최적설계 프레임 웍', CAD/CAM학회논문지, 제10권, 제5호, 2005
|
6 |
Chechanowicz, Z., 'Risk Analysis: Requirements, Conflicts and Problems', Computer & Security, Vol. 16, 1997
|
7 |
Green, R., 'CAD Manager: Drawing Security', Cadalyst, 2005
|
8 |
Edward N. Deker and Joseph M. Newcomer, 'Developing Windows NT Device Drivers: A Programmer's Handbook', Addison-Wesley, 1999
|
9 |
Otwell, K. and B. Aldridge, 'The Role of Vulnerability in Risk Management', IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, pp. 32-38, 1989
|
10 |
정연찬, 박준철, 'CAD/CAM 응용 소프트웨어 개발을 위한 형상 커널 개발', 제6권, 제4호, 2001
|
11 |
Eloff, J. and M. Eloff, 'Information Security Management - A New Paradigm', Proceedings of SAIC-SIT, 2003
|
12 |
Marianthi Theoharidou, Spyros Kokolakis Maria Karyda, Evangelos Kiountouzis, 'The Insider Threat to Information Systems and the Effectiveness of ISO17799', Computer & Security, Vol. 24, 2005
|