安全文档

http://www.doc88.com/p-0824775188202.html

 

以企业入侵检测日志分析为场景漫谈大数据安全

http://sec.chinabyte.com/458/13420958.shtml

攻击建模过程

http://www.51cto.com/art/200712/63063.htm

 

 

http://www-01.ibm.com/support/knowledgecenter/SSQP76_8.7.1/com.ibm.odm.itoa.develop/topics/odm_itoa_develop.html

猜你喜欢

转载自qgl.iteye.com/blog/2237711