[2] Dorothy Denning, "Cryptography and Data Security", Addison Wesley. International Standard Book Number (ISBN)
0-20 1- 10 150-5.
[3] M. Bishop and D. Bailey, "Critical Analysis of Vulnerability Classification",
Technical Report CSE-96- 1 1, Department of Computer Science, University of California
Davis 956 16-8562, Davis, California (September 1996).
[4] Microsoft Security Center.
/China/TechNet/security/default . mspx
[5] The first copy. /english/index.php
[6] international CVE standard. /research/policy/, obtained in 2003.
[25] William Apau, William L. Fissen and john mchugh. 20001Feb
Window of loopholes: a case study. IEEE computer.
[26] rose anderson. 200 1. safety engineering: building a reliable
Distributed system. John Wiley & sons. ISBN: 0-47 1-38922-6。
27 Matt Bishop. 2003. Art and Science. Addison Wesley
Major. ISBN: 0-20 1-44099-7。
28 Matt Bishop. 1999 September. Vulnerability analysis. minutes of the meeting
The second international symposium on new progress of intrusion detection.
[29] Shan, Dai,. Research on the classification of computer vulnerabilities. Computer Engineering, 2002,28 (10): 3-6.
[30] Xia Yunqing Editor-in-Chief Visual C++ 6.0 Database Advanced Programming Beijing Hope Electronic Publishing House
[3 1] Duan Gang edited Encryption and Decryption (2nd Edition) Electronic Industry Press.
[33] Hou explained MFC 2nd Edition Huazhong University of Science and Technology Press.
[34] Application of Microsoft.NET Framework Programming (USA) Jeffrey Richter with Tsinghua.
University press
35 National Vulnerability Database
[38] Internet security system -X-Force database.
/xforce/search.php
39 open source vulnerability database