Bibliography

[biblio07_01] (Saltzer and Schroeder 1975) Saltzer,JeromeH., and MichaelD.Schroeder. “The Protection of Information in Computer Systems,” http://web.mit.edu/Saltzer/www/publications/protection/index.html. 1975.

[biblio07_02] (Computer Security Resource Center 2002) “Early Computer Security Papers, Part I,” http://csrc.nist.gov/publications/history/index.html. June 2002.

[biblio07_03] (Yan and Randell 2005) Yan,J., and B.Randell. “Security in Computer Games: From Pong to Online Poker,” http://www.cs.ncl.ac.uk/research/pubs/authors/byType.php?id=408. February 2005.

[biblio07_04] (Anderson 2001) Anderson,Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. New York, NY: John Wiley & Sons, 2001.

[biblio07_05] (Bishop 2002) Bishop,Matt. Computer Security: Art and Science. Boston, MA: Addison-Wesley, 2002.

[biblio07_06] (Howard and LeBlanc 2003) Howard,Michael, and DavidLeBlanc. Writing Secure Code, Second Edition. Redmond, WA: Microsoft Press, 2003.

[biblio07_07] (Rescorla and Korver 2003) Rescorla,E., and B.Korver. “Guidelines for Writing RFC Text on Security Considerations,” ftp://ftp.rfc-editor.org/in-notes/rfc3552.txt. RFC 3552, July 2003.

[biblio07_08] (Wikipedia 2006) “Kerchoff’s Law,” http://en.wikipedia.org/wiki/Kerchoffs_law.

[biblio07_09] (McCabe and Watson 1994) McCabe,ThomasJ., and ArthurH.Watson. “Software Complexity,” http://www.stsc.hill.af.mil/crosstalk/1994/12/xt94d12b.asp. Crosstalk, December 1994.

[biblio07_10] (VanDoren 2000) VanDoren,Edmond. “Cyclomatic Complexity,” http://www.sei.cmu.edu/str/descriptions/cyclomatic.html. July 2000.

[biblio07_11] (VanDoren 1997) VanDoren,Edmond. “Halstead Complexity Measures,” http://www.sei.cmu.edu/str/descriptions/halstead.html. January 1997.

[biblio07_12] (Microsoft 2004) Microsoft Security Bulletin MS04-030. “Vulnerability in WebDAV XML Message Handler Could Lead to a Denial of Service,” http://www.microsoft.com/technet/security/bulletin/ms04-030.mspx. October 2004.

[biblio07_13] (Microsoft 2005a) “Malicious Software Encyclopedia: Win32/Sasser,” http://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32%2fSasser. January 2005.

[biblio07_14] (Microsoft 2005b) “Malicious Software Encyclopedia: Win32/Zotob,” http://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32%2fzotob. November 2005.

[biblio07_15] (Microsoft 2006) “Using the Checkv4.exe Utility,” http://msdn.microsoft.com/library/en-us/winsock/winsock/using_the_checkv4_exe_utility_2.asp. MSDN, January 2006.

[biblio07_16] (Microsoft 2005c) “Privileges,” http://msdn.microsoft.com/library/en-us/secauthz/security/privileges.asp. MSDN, December 2005.

[biblio07_17] (Rich 2005) Rich,Amy. “The Least Privilege Model in the Solaris 10 OS,” http://www.sun.com/bigadmin/features/articles/least_privilege.html. February 2005.

[biblio07_18] (Solar and Mondi 2005) Solar, and AdamMondi. “POSIX Capabilities,” http://www.gentoo.org/proj/en/hardened/capabilities.xml. January 2005.

[biblio07_19] (Microsoft 2002) “SiteLock Template 1.04 for ActiveX Controls,” http://msdn.microsoft.com/archive/en-us/samples/internet/components/sitelock/default.asp. MSDN, May 2002.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.205.232