Wikipedia (chū-iû ê pek-kho-choân-su) beh kā lí kóng...
Tēn-náu an-tsuân, bāng-lōo an-tsuân, hi̍k-tsiá sìn-sit ki-su̍t [en] an-tsuân (IT an-tsuân) (ing-gú: Computer security, cybersecurity (cyber security), information technology security (IT security)) sī pó-hōo tēn-náu hē-thóng hām bāng-lōo bén-siū sìn-sit sia̍p-lōo, tsha̍t-thau hi̍k-tsiá sún-hāi i-ê ngē-thé [en], nńg-thé hi̍k-tsiá tēn-tsí sòo-kì, í-kip bén-siū kan-jiáu [en] hi̍k gōo-tō in thê-kiong ê ho̍k-bū.[1][2]
- Jeremy Bob, Yonah (2021) "Ex-IDF cyber intel. official reveals secrets behind cyber offense". The Jerusalem Post
- Branch, J. (2020). "What's in a Name? Metaphors and Cybersecurity." International Organization.
- Costigan, Sean; Hennessy, Michael (2016). Cybersecurity: A Generic Reference Curriculum (PDF). NATO. ISBN 978-9284501960.
- Fuller, Christopher J. "The Roots of the United States’ Cyber (In)Security," Diplomatic History 43:1 (2019): 157–185. online
- Kim, Peter (2014). The Hacker Playbook: Practical Guide To Penetration Testing. Seattle: CreateSpace Independent Publishing Platform. ISBN 978-1494932633.
- Lee, Newton (2015). Counterterrorism and Cybersecurity: Total Information Awareness (2nd pán.). Springer. ISBN 978-3319172439.
- Montagnani, Maria Lillà and Cavallo, Mirta Antonella (26 July 2018). "Cybersecurity and Liability in a Big Data World". SSRN.
- Singer, P. W.; Friedman, Allan (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. ISBN 978-0199918119.
- Wu, Chwan-Hwa (John); Irwin, J. David (2013). Introduction to Computer Networks and Cybersecurity. Boca Raton: CRC Press. ISBN 978-1466572133.
- M. Shariati et al. / Procedia Computer Science 3 (2011) 537–543. Enterprise information security, a review of architectures and frameworks from interoperability perspective