1 |
Willam Stallings, "Network and Internetwork Security".Prentice Hall, 1995.
|
2 |
J.Hruska,"Computer Virus and Anti-virus Warfare" Ellis Horwood, 1992
|
3 |
P.Denning"Computer Under Attack Intruders, Worms, and Virus", Addison-Wesley,1990
|
4 |
F.Cohen,"A short Course on Computer Viruses". ASP Press, 1990 5 .1986.
|
5 |
Bruce Schneier, "Applies Cryptography", Wiley, Second Edition, 1996
|
6 |
OWASP, CSRF Guard, http://www.owasp.org/index.php/CSRF_Guard
|
7 |
David Gourley and Brian Totty, "HTTP: The Definitive Guide", O'Reilly Media, 2002.
|
8 |
SiChoon, Noh, Multi-Level Protection Building for Virus Protection Infrastructure, Springer Springer LNCS 3036,2004
|
9 |
SiChoon, Noh, Protection Structure Building for Mal icious Traf f ic Protect ing in Int ranet Systems,Springer LNCS 3981
|
10 |
Stepen Cost, An Introduction to SQL Injection Attacks,for Oracle develops, 2007.3
|
11 |
류재철(충남대학교), 악성코드의 새로운 보금자리 '스마트폰', 2011.06
|
12 |
김정녀, 스마트폰 보안 기술 동향 및 전망, 2010.11
|