共 12 条
[1]
[Anonymous], 2001, Incident response: A strategic guide to handling system and network security breaches
[2]
[Anonymous], 1992, FLAMING RELATIONSHIP
[3]
Einwechter N., 2002, PREVENTING DETECTING
[4]
GUDAITIS TM, 1999, CYBERPSYCHOL BEHAV, V1, P4
[5]
MORAHANMARTIN J, 1998, IRISS C 25 27 MARCH
[6]
Parker D., 1998, Fighting Computer Crime
[7]
SHAW ED, 1998, SECURITY AWARENESS B, V2, P27
[8]
SULER J, 1998, BAD BOYS CYBERSPACE
[9]
TUGLULAR T, 1997, UNPUB FRAMEWORK CHAR
[10]
WOOD BJ, 2002, INSIDER THREAT MODEL