-
1Academic Journal
المساهمون: 華岡工程學報
مصطلحات موضوعية: 縱深防禦, 協同防禦, 資安設備, Defense-in-Depth, cooperative defense, information security device, scipo, droit
-
2Academic Journal
المساهمون: 華岡工程學報
مصطلحات موضوعية: 縱深防禦, 協同防禦, 資安設備, Defense-in-Depth, cooperative defense, information security device
وصف الملف: 175 bytes; text/html
Relation: 華岡工程學報 ; 27 期 (2011 / 01 / 01) , P116 - 124; http://ir.lib.pccu.edu.tw//handle/987654321/28729; http://ir.lib.pccu.edu.tw/bitstream/987654321/28729/2/index.html
-
3Dissertation/ Thesis
المؤلفون: 江家裕
مصطلحات موضوعية: 風險評鑑, 縱深防禦, 能力成熟度, 進階持續威脅, Risk Assessment, Defense in Depth, Capability Maturity, Advanced Persistent Threat
وصف الملف: 169 bytes; text/html
Relation: http://ir.lib.ntust.edu.tw/handle/987654321/77618; http://ir.lib.ntust.edu.tw/bitstream/987654321/77618/1/index.html
-
4
المؤلفون: 劉彥志
المساهمون: 資訊安全產業研發碩士專班
-
5
المؤلفون: 李政達, Lee, Cheng-Ta
المساهمون: 臺灣大學: 資訊管理學研究所, 林永松
مصطلحات موضوعية: 無線感測網路, 物體監控, 入侵偵測, 縱深防禦, 物體追蹤, 服務品質, 電能效?系統模擬, 拉格蘭日鬆弛法, 數學規劃, 網路最佳化, wireless sensor networks, object monitoring, intrusion detection, in-depth defense, object tracking, quality of services, energy-efficiency, system simulation, Lagrangean relaxation, mathematical modeling, network optimization
وصف الملف: 1458219 bytes; application/pdf
Relation: http://ntur.lib.ntu.edu.tw/handle/246246/251465; http://ntur.lib.ntu.edu.tw/bitstream/246246/251465/1/ntu-99-D90725001-1.pdf
-
6Dissertation/ Thesis
المؤلفون: 李長霖, Lee, Chang-Lin, 蔡文能, Tsai, Wen-Nung
المساهمون: 資訊學院資訊學程
مصطلحات موضوعية: 縱深防禦, 虛擬化, 效能測試, 網路安全, Defense-in-Depth, Virtualization, Performance Benchmark, Network Security
-
7
المؤلفون: 劉彥志
المساهمون: 資訊安全產業研發碩士專班
وصف الملف: 137 bytes; text/html
Relation: http://ir.lib.pccu.edu.tw//handle/987654321/20339; http://ir.lib.pccu.edu.tw/bitstream/987654321/20339/1/index.html
-
8
المؤلفون: 蔡明志, Ming-Chih Tsai
المساهمون: 資訊傳播系
مصطلحات موضوعية: NetFlow, MRTG, 合作式防火牆, 縱深防禦, IP追蹤技術, COFS, defense-in-depth, IP Tracking Technology
Time: 21
وصف الملف: 143 bytes; application/octet-stream
-
9
المؤلفون: 黃遠芳, Yuan-Fang Huang
المساهمون: 黃能富, Nen-Fu Huang
مصطلحات موضوعية: 安全交換機, 負載平衡, 高可用度, 縱深防禦, security switch, load balance, high availability, defense-in-depth, archi, droit
Time: 48
-
10
المؤلفون: 黃遠芳, Yuan-Fang Huang
المساهمون: 黃能富, Nen-Fu Huang
مصطلحات موضوعية: 安全交換機, 負載平衡, 高可用度, 縱深防禦, security switch, load balance, high availability, defense-in-depth
Time: 48
وصف الملف: 155 bytes; text/html
Relation: [1]. Computer Crime Research Center, http://www.crime-research.org/ [2]. LVS (Linux Virtual Server), http://www.linuxvirtualserver.org/ [3]. Nen-Fu Huang, Chih-Hao Chen, Rong-Tai Liu, Chia-Nan Kao, “On the Design of a Cost Effective Network Security Switch Architecture,” to appear in the IEEE GLOBECOM 2005, St. Louis, Missouri, USA, November 2005. [4]. Xin Liu and Andrew A. Chien. Traffic-based Load Balance for Scalable Network Emulation. Proceedings of SC2003 (November 2003). [5]. HA (High Availability), http://www.linuxvirtualserver.org/HighAvailability/ [6]. Linux HA, http://www.linux-ha.org/ [7]. Cisco system Inc, Cisco Catalyst 6500 Series Switch, http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/ [8]. 3Com. Security Switch , http://www.3com.com/prod/cz_CZ_EMEA/prodlist.jsp?tab=cat&cat=134482&subcat=171050 [9]. Alcatel OmniSwitch 6600 , http://www.alcatel.com/products/productsummary.jhtml?repositoryID=/x/opgproduct/OS6000series.jhtml [10]. Rich Seifert, “The Switch Book :The Complete Guide to LAN Switching Technology ”, John Wiley & Sons, Inc., 2000. [11]. Douglas B. WEST, “Introduction to Graph Theory (2nd Edition)”. [12]. Alessandro Rubini & Jonathan Corbet, “Linux Device Driver, Second edition: A NUIX-COMPATIBLE OPERATING SYSTEM ”, O’REILLY. [13]. Nexcom International Co., LTD, Http://nsa.nexcom.com.tw/utf-8/index.jsp [14]. The netfilter/iptables project, http://www.netfilter.org/ [15]. Bridge - Linux Ethernet bridging, http://bridge.sourceforge.net/ [16]. Snort.org, Http://www.snort.org/ [17]. Jack Koziol, “Intrusion Detection with Snort”, SAMS, 2003 [18]. IEEE 802.1D: Media Access Control (MAC) Bridge, 1998. [19]. IEEE 802.1Q: Virtual Bridge Local Area Networks, May 2003 [20]. Cisco System Inc., “Cisco Catalyst 2950 Series Switches with Enhanced Image SW” [21]. Cisco system Inc, Cisco 2950 Switch Software Configuration Guide [22]. Kennedy Clark and Kevin Hamilton, “Cisco LAN Switching :The most complete guide to Cisco Catalyst switch network design, operation, and configuration ”, Cisco Press, 2001. [23]. Analysis Console for Intrusion Databases, http://acidlab.sourceforge.net.net/ [24]. SNORT+MYSQL+ACID, http://www.snort.org/docs/snort_acid_rh9.pdf [25]. RRDtool : logging &graphing, http://people.ee.ethz.ch/~oetiker/webtools/rrdtool/ [26]. SNMP Software, http://www.net-snmp.org/ [27]. Douglas R. Mauro & Kevin J. Schmidt, Essential SNMP : Help for System and Network Administrators, 2001 ,O’REILLY [28]. IXIA: Leader in IP Network Testing, http://www.ixiacom.com/ [29]. Michael Beck, Harald Bohme, Mirko Dziadzka, Ulrich Kunitz, Robert Magnus, Dirk Verworner, “ Linux Kernel Programming Third Edition”, Addison Wesley Professional., 2003 [30]. Jay Beale, Caswell, “Snort 2.1 Intrusion Detection Second Edition”, SYNGRESS, 2004; http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/29387