QUEST - A SECURITY AUDITING TOOL

被引:2
|
作者
KAPILOW, SA
CHEREPOV, M
机构
来源
AT&T TECHNICAL JOURNAL | 1988年 / 67卷 / 03期
关键词
D O I
10.1002/j.1538-7305.1988.tb00632.x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:65 / 71
页数:7
相关论文
共 50 条
  • [41] The Worker's Quest for Security
    Altmeyer, Arthur J.
    [J]. MONTHLY LABOR REVIEW, 1950, 71 (01) : 31 - 37
  • [42] The Quest for Security in the Middle East
    Hoskins, Halford L.
    [J]. ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1954, 294 : 138 - 146
  • [43] An electronic site data auditing tool
    Stablein, D
    Miroff, A
    Sarda, A
    Lindblad, A
    [J]. CONTROLLED CLINICAL TRIALS, 2003, 24 : 188S - 188S
  • [44] ENVIRONMENTAL AUDITING - A TIMELY AND EFFECTIVE TOOL
    MACINTYRE, ST
    [J]. JOURNAL OF THE AIR POLLUTION CONTROL ASSOCIATION, 1983, 33 (09): : 909 - 913
  • [45] Application of Security Metrics in Auditing Computer Network Security: A Case Study
    Premaratne, Upeka
    Samarabandu, Jagath
    Sidhu, Tarlochan
    Beresh, Bob
    Tan, Jian-Cheng
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2008, : 448 - +
  • [46] IT security auditing: A performance evaluation decision model
    Herath, Hemantha S. B.
    Herath, Tejaswini C.
    [J]. DECISION SUPPORT SYSTEMS, 2014, 57 : 54 - 63
  • [47] The Role of Accounting and Professional Associations in IT Security Auditing
    Islam, Sharif
    Jiang, Randi
    Poston, Robin S.
    Gal, Graham
    Phillips, Paul
    Stafford, Thomas F.
    [J]. AMCIS 2017 PROCEEDINGS, 2017,
  • [48] Cloud Security Auditing: Challenges and Emerging Approaches
    Ryoo, Jungwoo
    Rizvi, Syed
    Aiken, William
    Kissell, John
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (06) : 68 - 74
  • [49] Wireless Network Penetration Testing and Security Auditing
    Wang, Shao-Long
    Wang, Jian
    Feng, Chao
    Pan, Zhi-Peng
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [50] Autonomic 802.11 wireless LAN security auditing
    Branch, JW
    Petroni, NL
    Van Doorn, L
    Safford, D
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 56 - 65