8.6 ╤∩Φ±ΩΦ Ωεφ≥≡εδⁿφ√⌡ Γε∩≡ε±εΓ ∩ε ßστε∩α±φε±≥Φ

[AUCOIN]
Aucoin, R., "Computer Viruses: Checklist for Recovery", Computers in Libraries, Vol. 9, No. 2, Pg. 4, 1 February 1989.

[WOOD]
Wood, C., Banks, W., Guarro, S., Garcia, A., Hampel, V., and H. Sartorio, "Computer Security: A Comprehensive Controls Checklist", John Wiley and Sons, Interscience Publication, 1987.

8.7 ─ε∩εδφΦ≥σδⁿφ√σ ∩≤ßδΦΩα÷ΦΦ

[DDN88]
Defense Data Network, "BSD 4.2 and 4.3 Software Problem Resolution", DDN MGT Bulletin #43, DDN Network Information Center, 3 November 1988.

╬ß· ΓδσφΦσ Γ "Defense Data Network Management Bulletin" εß Φ±∩≡αΓδσφΦ ⌡ ε°ΦßεΩ Γ 4.2bsd Φ 4.3bsd, ∩ε±δ≤µΦΓ°Φ⌡ ∩≡Φ≈ΦφεΘ ╚φ≥σ≡φσ≥εΓ±Ωεπε ≈σ≡Γ .

[DDN89]
DCA DDN Defense Communications System, "DDN Security Bulletin 03", DDN Security Coordination Center, 17 October 1989.

╥≡≤Σ√ ╥╚╚▌╨

[IEEE]
"Proceedings of the IEEE Symposium on Security and Privacy", ∩≤ßδΦΩ≤■≥±  σµσπεΣφε.

╥≡≤Σ√ ╥╚╚▌╨ Σε±≥≤∩φ√ ∩ε αΣ≡σ±≤:

Computer Society of the IEEE
P.O. Box 80452
Worldway Postal Center
Los Angeles, CA  90080

═αταΣ | ╤εΣσ≡µαφΦσ