Tài liệu tham khảo |
Loại |
Chi tiết |
1. L. Ponemon: Fourth Annual US Cost of Data Breach Study. In: the Ponemon Institute (2009) |
Sách, tạp chí |
Tiêu đề: |
Fourth Annual US Cost of Data Breach Study |
|
2. Charles, J. K.: Automated Penetration Testing: Completing the Vulnerability Management Framework (2007) |
Sách, tạp chí |
Tiêu đề: |
Completing the Vulnerability Management Framework |
|
3. J. Shewmaker: Introduction To Network Penetration Testing. In: the 7th Annual IT Security Awareness Fair (2008) |
Sách, tạp chí |
Tiêu đề: |
Introduction To Network Penetration Testing |
|
4. A. Petukhov, D. Kozlov: Detecting Security Vulnerabilities in Web Applications using Dynamic Analysis with Penetration Testing. In: proceedings of the Application Security Conference (2008) |
Sách, tạp chí |
Tiêu đề: |
Detecting Security Vulnerabilities in Web Applications using Dynamic Analysis with Penetration Testing |
|
5. J. S. Tiller: The Ethical Hacker: A Framework For Business Value Penetration Testing. In: Auerbatch publications, pp. 60—67 (2005) |
Sách, tạp chí |
Tiêu đề: |
A Framework For Business Value Penetration Testing. In: Auerbatch publications |
|
6. Federal Office for Information Security (BSI): Study: A Penetration Testing Model, https://ssl.bsi.bund.de/english/publications/studies/penetration.pdf (2003) |
Sách, tạp chí |
Tiêu đề: |
A Penetration Testing Model |
|
7.L. David, A. Chris, H. John, G. Bill: The Database Hacker’s Handbook: Defending Database Servers, Wiley Publishing (2005) |
Sách, tạp chí |
Tiêu đề: |
Defending Database Servers |
|
8.L. David: The Oracle Hacker's Handbook: Hacking and Defending Oracle, Wiley Publishing (2007) |
Sách, tạp chí |
Tiêu đề: |
Hacking and Defending Oracle |
|
9.T.K. Dang., Q.C. Truong., P.H. Cu-Nguyen, T.Q.N. Tran: An Extensible Framework for Detecting Database Security Flaws. In: proceedings of the International Workshop on Advance Computing and Applications, Ho Chi Minh City, Vietnam (2007) |
Sách, tạp chí |
Tiêu đề: |
An Extensible Framework for Detecting Database Security Flaws |
|
10.Dang, T.K., Tran, T.Q.N., Truong, Q.C.: Security Issues in Housing Service Outsourcing Model with Database Systems. Technical Report, http://www.cse.hcmut.edu.vn/~asis (2008) |
Sách, tạp chí |
Tiêu đề: |
Security Issues in Housing Service Outsourcing Model with Database Systems |
|
11.T.Q.N Tran: Problems Of Using Penetration Testing For Detecting Database Security Flaws. In: proceedings of the 11th Conference on Science and Technology (2009) |
Sách, tạp chí |
Tiêu đề: |
Problems Of Using Penetration Testing For Detecting Database Security Flaws |
|
15. R. B. Natan: The book: How to Secure and Audit Oracle 10g, 11g, Auerbach Publications (2009) |
Sách, tạp chí |
Tiêu đề: |
How to Secure and Audit Oracle 10g |
|
16.S. Hansman: A Taxonomy of Network and Computer Attack Methodologies. M.S Thesis, Department of Computer Science and Software Engineering, University of Canterbury, New Zealand, 2003 |
Sách, tạp chí |
Tiêu đề: |
A Taxonomy of Network and Computer Attack Methodologies |
|
17. Handbook of Information Security, Wiley Publishing (2005) |
Sách, tạp chí |
Tiêu đề: |
Handbook of Information Security |
|
18. K. Adam: Database Security: Attacks, Vulnerabilities, and Prevention (2009) |
Sách, tạp chí |
Tiêu đề: |
Attacks, Vulnerabilities, and Prevention |
|
19. Michael, E.W., Herbert, J.: Principles Of Information Security. Course Technology Publisher (2007) |
Sách, tạp chí |
Tiêu đề: |
Principles Of Information Security |
|
20. Simon, H.: A Taxonomy of Network and Computer Attack Methodologies (2003) |
Sách, tạp chí |
Tiêu đề: |
A Taxonomy of Network and Computer Attack Methodologies |
|
21. Slavid M., Hacking & Defending Databases (2007) |
Sách, tạp chí |
Tiêu đề: |
Hacking & Defending Databases |
|
12.Some database security sites, http://www.red-database-security.com, http://www.petefinnigan.com, http://www.securityfocus.com |
Link |
|
13.Some database testing tools, http://www.imperva.com, http://www.ngssoftware.com, http://www.nessus.org |
Link |
|