- 网络安全与攻防策略:现代威胁应对之道(原书第2版)
- (美)尤里·迪奥赫内斯 (阿联酋)埃达尔·奥兹卡
- 219字
- 2021-04-30 12:35:10
4.11 参考文献
[1]M.Clayton,Clues about who's behind recent cyber attacks on US banks,The Christian Science Monitor,pp.11,2012.Available:https://search.proquest.com/docview/1081779990.
[2]B.Harrison,E.Svetieva,and A.Vishwanath,Individual processing of phishing emails,Online Information Review,vol.40,(2),pp.265-281,2016.Available:https://search.proquest.com/docview/1776786039.
[3]M.Andress,Network vulnerability assessment management:Eight network scanning tools offer beefed-up management and remediation,Network World,vol.21,(45),pp.48-48,50,52,2004.Available:https://search.proquest.com/docview/215973410.
[4]Nmap:the Network Mapper-Free Security Scanner,Nmap.org,2017.[Online].Available:https://nmap.org/.[Accessed:20-Jul-2017].
[5]Metasploit Unleashed,Offensive-security.com,2017.[Online].Available:https://www.offensive-security.com/metasploit-unleashed/msfvenom/.[Accessed:21-Jul-2017].
[6]Free Download John the Ripper password cracker |,Hacking Tools,2017.[Online].Available:http://www.hackingtools.in/free-download-johnthe-ripper-password-cracker/.[Accessed:21-Jul-2017].
[7]R.Upadhyay,THC-Hydra Windows Install Guide Using Cygwin,HACKING LIKE A PRO,2017.[Online].Available:https://hackinglikeapro.blogspot.co.ke/2014/12/thc-hydra-windows-install-guide-using.html.[Accessed:21-Jul-2017].
[8]S.Wilbanks and S.Wilbanks,WireShark,Digitalized Warfare,2017.[Online].Available:http://digitalizedwarfare.com/2015/09/27/keep-calmand-use-wireshark/.[Accessed:21-Jul-2017].
[9]Packet Collection and WEP Encryption,Attack & Defend Against Wireless Networks-4,Ferruh.mavituna.com,2017.[Online].Available:http://ferruh.mavituna.com/paket-toplama-ve-wep-sifresini-kirmakablosuz-aglara-saldiri-defans-4-oku/.[Accessed:21-Jul-2017].
[10]Hack Like a Pro:How to Find Vulnerabilities for Any Website Using Nikto,WonderHowTo,2017.[Online].Available:https://null-byte.wonderhowto.com/how-to/hack-like-pro-find-vulnerabilities-forany-website-using-nikto-0151729/.[Accessed:21-Jul-2017].
[11]Kismet,Tools.kali.org,2017.[Online].Available:https://tools.kali.org/wireless-attacks/kismet.[Accessed:21-Jul-2017].
[12]A.Iswara,How to Sniff People's Password?(A hacking guide with Cain & Abel-ARP POISONING METHOD),Hxr99.blogspot.com,2017.[Online].Available:http://hxr99.blogspot.com/2011/08/how-to-sniff-peoplespassword-hacking.html.[Accessed:21-Jul-2017].
[13]A.Gouglidis,I.Mavridis,and V.C.Hu,Security policy verification for multidomains in cloud systems,International Journal of Information Security,vol.13,(2),pp.97-111,2014.Available:https://search.proquest.com/docview/1509582424DOI:http://dx.doi.org/10.1007/s10207-013-0205-x.
[14]R.Oliver,Cyber insurance market expected to grow after WannaCry attack,FT.com,2017.Available:https://search.proquest.com/docview/1910380348.
[15]N.Lomas.(Aug 19).Full Ashley Madison Hacked Data Apparently Dumped On Tor.Available:https://search.proquest.com/docview/1705297436.
[16]D.FitzGerald,Hackers Used Yahoo's Own Software Against It in Data Breach;'Forged cookies' allowed access to accounts without password,Wall Street Journal(Online),2016.Available:https://search.proquest.com/docview/1848979099.
[17]R.Sinha,Compromised!Over 32 mn Twitter passwords reportedly hacked Panache],The Economic Times(Online),2016.Available:https://search.proquest.com/docview/1795569034.
[18]T.Bradshaw,Apple's internal systems hacked,FT.Com,2013.Available:https://search.proquest.com/docview/1289037317.
[19]M.Clayton,Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?,The Christian Science Monitor,2010.Available:https://search.proquest.com/docview/751940033.
[20]D.Palmer,How IoT hackers turned a university's network against itself,ZDNet,2017.[Online].Available:http://www.zdnet.com/article/how-iothackers-turned-a-universitys-network-against-itself/.[Accessed:04-Jul-2017].
[21]S.Zhang,The life of an exhacker who is now banned from using the internet,Gizmodo.com,2017.[Online].Available:http://gizmodo.com/the-lifeof-an-ex-hacker-who-is-now-banned-from-using-t-1700074684.[Accessed:04-Jul-2017].
[22]Busted!FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online,Mail Online,2017.[Online].Available:http://www.dailymail.co.uk/news/article-2129257/Higinio-O-Ochoa-III-FBI-led-Anonymous-hacker-girlfriend-posts-picture-breasts-online.html.[Accessed:28-Nov-2017].