1 |
Arzi. Z., "Integrating a Key Cryptosystem into the Digital Signature Standard", Electronic Letters, Vol. 29, 1994.
|
2 |
Farley, M., T. Stearns, and J. Hsu, Data Integrity and Security, Triangle, 1997.
|
3 |
Garfingel, S., Spafford, G., Practical Unix and Internet Security, 2nd Ed., Initech, 1996.
|
4 |
Whilliam, S., Internet Securities, B&C Press, 1995.
|
5 |
Howard JD. "An Analysis of Security Incidents on the Internet", Ph. D Thesis, Carnegie Mellon University, 1997.
|
6 |
Jan-Martin Lowendahl, "Case Study: How to Use a Security Incident to Your Advantage (Lesions Learned at Goteborg University)", Gartner Industry Research, 2007
|
7 |
Kristen Noakers-Fry, Richard Hunter, "Case Study: Information Security Governance at TeliaSonera", Gartner Research, 2006.
|
8 |
Mark Nicolett, Jeffrey Wheatman, "DAM Technology Provides Monitoring and Analytics With Less Overhead", Gartner Research, 2007.
|