1 |
James Manyika etc, "Big data: The next frontier for innovation, competition, and productivity", McKinsey Global Institute, 2011
|
2 |
Jyung Hyun Kim, "BigDataplatform-based socia-l net workdata analysis paractices", 2012
|
3 |
John P. Wack, "Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls", NIST Special Publication, 1994
|
4 |
KISA Internet Weekly, 2012.08.02
|
5 |
Tyler Bell, "Big Data: An oppertunity in search of a metaphor", rader.oreilly.com/2011/02/big-datameterphor.html
|
6 |
NACS : Client/Server Security Assessment and Awareness, Accessed; 2009.04
|
7 |
Ahn, C. W. and S. G. Hwang, "Big Data technologies and main issues", Journal of Korean Institute of Information Scientist and Engineers, Vol.30, No.6, pp.10-17, 2012
|
8 |
Kyung-Bae Min, Jang-Mook Kang, "Rights to Control Information and Related Security Technologies on the CyberSpace", Journal of the institute of internet, broadcasting and communicaion, Vol.10, No.2, pp.136-142, 2010
|