Current location - Education and Training Encyclopedia - Graduation thesis - Computer virus papers and documents
Computer virus papers and documents
[1] Feng Dengguo. Computer communication network security. Beijing: Tsinghua University Publishing House, 200 1.

[2] Dorothy Denning, "Cryptography and Data Security", Addison Wesley. International Standard Book Number (ISBN)

0-20 1- 10 150-5.

[3] M. Bishop and D. Bailey, "Critical Analysis of Vulnerability Classification",

Technical Report CSE-96- 1 1, Department of Computer Science, University of California

Davis 956 16-8562, Davis, California (September 1996).

[4] Microsoft Security Center.

/China/TechNet/security/default . mspx

[5] The first copy. /english/index.php

[6] international CVE standard. /research/policy/, obtained in 2003.

[25] William Apau, William L. Fissen and john mchugh. 20001Feb

Window of loopholes: a case study. IEEE computer.

[26] rose anderson. 200 1. safety engineering: building a reliable

Distributed system. John Wiley & sons. ISBN: 0-47 1-38922-6。

27 Matt Bishop. 2003. Art and Science. Addison Wesley

Major. ISBN: 0-20 1-44099-7。

28 Matt Bishop. 1999 September. Vulnerability analysis. minutes of the meeting

The second international symposium on new progress of intrusion detection.

[29] Shan, Dai,. Research on the classification of computer vulnerabilities. Computer Engineering, 2002,28 (10): 3-6.

[30] Xia Yunqing Editor-in-Chief Visual C++ 6.0 Database Advanced Programming Beijing Hope Electronic Publishing House

[3 1] Duan Gang edited Encryption and Decryption (2nd Edition) Electronic Industry Press.

[33] Hou explained MFC 2nd Edition Huazhong University of Science and Technology Press.

[34] Application of Microsoft.NET Framework Programming (USA) Jeffrey Richter with Tsinghua.

University press

35 National Vulnerability Database

[38] Internet security system -X-Force database.

/xforce/search.php

39 open source vulnerability database