Detecting Remote Attacks

碩士 === 國立中山大學 === 資訊管理學系研究所 === 92 === With the advanced technology, our life has improved, however, it also brings the new model of crime events. Because the intrusion technique and intrusion tools are developed day by day, many computer crimes such as overstep system authority, intrusion events, c...

Full description

Bibliographic Details
Main Authors: Wang-tzu Han, 王辭寒
Other Authors: Chen-chia Mei
Format: Others
Language:zh-TW
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/05525494430963261526