共 13 条
[1]
Brandt A., 2009, PC WORLD, V27, P62
[3]
Dunham K., 2007, Information Systems Security, V16, P123, DOI 10.1080/10658980601051763
[4]
HADHAZY AT, 2009, DISCOVER, V30, P12
[5]
Johnston S. J., 2008, PC WORLD, V26, P54
[6]
Lemos R., 2006, PC MAGAZINE, V25, P117
[7]
Luo X., 2007, INFORM SECURITY J, V16, P195, DOI DOI 10.1080/10658980701576412
[8]
Naraine R., 2008, EWEEK, V25, P12
[9]
Prince B, 2008, EWEEK, V25, P16
[10]
Rubenking N. J., 2008, ZDNET