透過您的圖書館登入
IP:18.119.213.235
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

並列摘要


Information security is an increasingly important concern among many corporate leaders and system managers who are responsible for computer systems. A modern Information Technology (IT) system, drastically changing the current business/management, is structured by an open system where many different disturbances (e.g., corporate secret agents, hackers and terrorists) influence the IT-based decision making process and business performance/practice. This study is concerned about such a security issue, in particular focusing upon how the infrastructure of a corporate network is protected from hostile agents. The study is also interested in whether the security issue influences our corporate decision making in the e-business world.

參考文獻


Abbott, R.P.,J.S. Chin,J.E. Donnelley,W.L. Konigsford,S. Tokubo,D.A. Webb(1976).Security Analysis and Enhancements of Computer Operating Systems, Technical Report NBSIR 76-1041.Washington, USA:Lawrence Livermore Laboratory, Institute for Computer Sciences and Technology, National Bureau of Standards.
Ahuja, V.(1996).AP Professional.MA, USA:
Allen, J.(2002).Firewalls and Proxies.Software Engineering Institute, Carnegie Mellon University.
Amoroso, E.G.(1994).Fundamentals of Computer Security Technology.Prentice-Hall PTR.
Anderson, J.M.(2003).Why we need a new definition of information security.Computers & Security.22(4),308-313.

延伸閱讀