Цитирование: | [1] Mazov N.A., Revnivykh A.V., Fedotov A.M., Analysis of information security risks. Vestnik NGU. Ser.: Information Technologies. 2011; 9(2): 80–89.
[2] Brinkley D.L., Schell R.R., “What is there to worry about? An Introduction to the Computer Security Problem”. Information Security: An Integrated Collection of Essays. 1995; 11–39.
[3] Revnivykh A.V. Fedotov A.M., Monitoring of information infrastructure of the organizations. Vestnik NGU. Ser.: Information Technologies. 2014. ISSN 1818-7900. (in Russian)
[4] Mukhanova A.A., Revnivyh A.V., Fedotov A.M., Classification of threats and vulnerabilities of information security in corporate systems. Vestnik NSU. Ser.: Information Technologies. 2013. ISSN 1818-7900. (in Russian)
[5] Hogan C.B., “Protection Imperfect: The Security of Some Computing Environments”. ACM SIGOPS Operating Systems Rev. 1988; 22(3), 7–27.
[6] Department of Defence Trusted Computer System Evaluation Criteria, DoD 5200.28-STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll (also known as “Orange Book”).
[7] National Vulnerability Database. http://nvd.nist.gov/.
[8] MITRE Corp, CommonVulnerabilities and Exposures. http://www.cve.mitre.org/.
[9] Securityfocus. http://www.securityfocus.com.
[10] Witten B., Landwehr C., Caloyannides M., (2001, September/October). Does Open Source Improve System Security? IEEE Software, 57–61. Retrieved 5 May 2008, from Computer Database.
[11] Lawton G., (March 2002). Open Source Security: Opportunity or Oxymoron Computer, 18–21. Retrieved 5 May 2008, from IEEE Computer Society Digital Library.
[12] Wagner David, Foster Jeffrey S., Brewer Eric A., Aiken Alexander., A first step towards automated detection of buffer overrun vulnerabilities. In: Network and Distributed System Security Symposium. San Diego, CA, February 2000; 3–17.
[13] Viega J., Bloch J.T., KohnoY., Mcgraw G., Its4: a static vulnerability scanner for C and C++ code. In: Computer Security Applications. ACSAC ’2000. 16Th Annual Conference. 2000; 257–267.
[14] Ball Thomas, Bounimova Ella, Cook Byron, Levin Vladimir, Lichtenberg Jakob, Mcgarvey Con, Ondrusek Bohus, Rajamani Sriram K., Ustuner Abdullah, Thorough static analysis of device drivers. SIGOPS Oper. Syst. Rev. 2006; 40(4): 73–85.
[15] Evans David, Larochelle David, Improving security using extensible lightweight static analysis. IEEE Software. 2002; 19(1): 42–51.
[16] XieYichen, ChouAndy, Engler Dawson R., Archer: using symbolic, path-sensitive analysis to detect memory access errors. In: ESEC / SIGSOFT FSE. 2003; 327–336.
[17] Islam S., DongW., Human factors in software security risk management. Proceedings of the first international workshop on Leadership and management in software architecture (LMSA2008), Leipzig, Germany, ACM, 2008.
[18] Aycock John, Computer Viruses and Malware. Springer. 2006. ISBN 978-0-387-30236-2.
[19] Filiol Eric, Computer viruses: from theory to applications. Springer. 2005. ISBN 978-2-287-23939-7. |