정보전자전의 이해와 사례

  • Published : 2000.12.01

Abstract

Keywords

References

  1. Information Terrorism: Can You Trust Your Toaster? M. G. Devost;B. K. Houghton;N. A. Pollard
  2. 1996 IEEE Symp. on Security and Privacy Java Security: From HotJava to Netscape and Beyond D. Dean;E. W. Felten;D. S. Wallach
  3. Information Systems Security v.6 no.Issue 2 Information Warfare and Information Systems Security Professional G. Kovacich
  4. What is Information Warfare M. Libichi
  5. The Digital Threat: United States National Security and Computers M. G. Devost
  6. Committee on Governmental Affairs Testimony in Hackers Penetrate D.O.D. Computer Systems: Hearings before the Subcommittee on Government Information & Regulation J. L. Brock
  7. Information Warfare and Security D. E. Denning
  8. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espinage C. Stoll
  9. Cyberpunk: Outlaws & Hackers on the computer Frontier K. Hafner;J. Markoff
  10. Computers Under Attack: Intruders, Worms & Viruses P. J. Denning
  11. The Hacker Crackdown: Law and Disorder on the Electronic Frontier B. Sterling
  12. ISSUES in Sci. and Tech. Fall An Electronic Pearl Harbor? Not Likely G. Smith