[biblio01_001] (Microsoft 2002) Trustworthy Computing site, http://www.microsoft.com/mscorp/twc/default.mspx.
[biblio01_002] (APWG 2006) Anti-Phishing Working Group, http://www.antiphishing.org/.
[biblio01_003] (Clark and Davis 1995) and “A Human Capital Perspective on Criminal Careers,” Journal of Applied Business Research, , no 3. 1995, pp. 58–64.
[biblio01_004] (FBI 2005) “FBI Announces Two Arrests in Mytob and Zotob Computer Worm Investigation,” http://www.fbi.gov/pressrel/pressrel05/zotob_release082605.htm. August 2005.
[biblio01_005] (CNN 2003) “Teenager arrested in ‘Blaster’ Internet attack,” http://www.cnn.com/2003/TECH/internet/08/29/worm.arrest/. August 2003.
[biblio01_006] (eWeek 2004) “App Developers Need to Redouble Security Efforts,” http://www.eweek.com/article2/0,1759,1663716,00.asp. September 2004.
[biblio01_007] (ZDNet 2006a) “Oracle from unbreakable to unpatchable,” http://blogs.zdnet.com/Ou/?p=151&tag=nl.e622. January 2006.
[biblio01_008] (InformationWeek 2005) “Bug Bites McAfee Antivirus,” http://www.informationweek.com/showArticle.jhtml?articleID=175007526. December 2005.
[biblio01_009] (ZDNet 2006b) “Backup software flaws pose risk,” http://news.zdnet.com/2100-1009_22-6028515.html. January 2006.
[biblio01_010] (Computerworld 2006) “Targeted attacks expected to rise in ’06, IBM study says,” http://www.computerworld.com/securitytopics/security/story/0,10801,107992,00.html. January 2006.
[biblio01_011] (OSVBD 2006a) Open Source Vulnerability Database. Oracle, http://www.osvdb.org/searchdb.php?action=search_title&vuln_title=oracle.
[biblio01_012] (OSVDB 2006b) Open Source Vulnerability Database. CRM software, http://www.osvdb.org/searchdb.php?action=search_title&vuln_title=crm.
[biblio01_013] (OSVDB 2006c) Open Source Vulnerability Database. http://www.osvdb.org/searchdb.php?action=search_title&vuln_title=lotus+domino.
[biblio01_014] (OSVDB 2006d) Open Source Vulnerability Database. http://www.osvdb.org/searchdb.php?action=search_title&vuln_title=firewall.
[biblio01_015] (Flake 2004) “Structural Comparison of Executable Objects,” http://www.sabre-security.com/files/dimva_paper2.pdf.
[biblio01_016] (Moore 2006) Metasploit Project, http://www.metasploit.com.
[biblio01_017] (eWeek 2005) and “Data Thefts Reveal Storage Flaws,” http://www.eweek.com/article2/0,1759,1772598,00.asp. March 2005.
[biblio01_018] (CNN 2002) “Ellison: Oracle remains unbreakable,” http://archives.cnn.com/2002/TECH/industry/01/21/oracle.unbreakable.idg/index.html. January 2002.
[biblio01_019] (Security Innovation 2006) “Regulatory Compliance Demystified: An Introduction to Compliance for Developers,” http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnsecure/html/regcompliance_demystified.asp. MSDN, March 2006.
[biblio01_020] (Howard, LeBlanc, and Viega 2005) and 19 Deadly Sins of Software Development. New York, NY: McGraw-Hill, 2005. Chapter 4, “SQL Injection.”
[biblio01_021] (Johansson 2005) “Anatomy of a Hack,” http://www.microsoft.com/australia/events/teched2005/mediacast.aspx. Microsoft Tech.Ed, 2005).
[biblio01_022] (Red Database 2006) Red Database Security. “Published Oracle Security Alerts,” http://www.red-database-security.com/advisory/published_alerts.html.
[biblio01_023] (ZDNet 2006c) “Google admits Desktop security risk,” http://news.zdnet.co.uk/0,39020330,39253447,00.htm. February 2006.
[biblio01_025] (NIAP 2005) National Information Assurance Partnership, National Security Agency. “Protection Profiles,” http://niap.nist.gov/pp/index.html.
[biblio01_026] (Microsoft 2003) Microsoft Help and Support. “How To Prevent Auditable Activities When Security Log Is Full,” http://support.microsoft.com/kb/140058/. Last Review: May 2003.
[biblio01_027] (OpenBSD 2004) OpenBSD 3.6 release errata & patch list. “002: Reliability Fix,” http://www.openbsd.org/errata36.html. November 2004.
[biblio01_028] (CVE 2006) Common Vulnerabilities and Exposures. http://cve.mitre.org.
[biblio01_029] (CVE 2005) “Re: Vulnerability Statistics,” http://seclists.org/lists/webappsec/2005/Jan-Mar/0056.html. January 2005.
[biblio01_030] (Gartner 2001) “Nimda Worm Shows You Can’t Always Patch Fast Enough,” http://www.gartner.com/DisplayDocument?doc_cd=101034. September 2001.
[biblio01_031] (CRN 2006) “Is Windows Safer?” http://www.crn.com/sections/coverstory/coverstory.jhtml;jsessionid=VV1Q351RM5A1YQSNDBOCKH0CJUMEKJVN?articleId=179103240. February 2006.
[biblio01_032] (Secunia 2006a) “Vulnerability Report: Apache 2.0.x,” http://secunia.com/product/73/.
[biblio01_033] (Secunia 2006b) “Vulnerability Report: Microsoft IIS 6.0,” http://secunia.com/product/1438/.
[biblio01_034] (Zone-H 2006) the Internet Thermometer. http://www.zone-h.org.
[biblio01_035] (CNET 2006) “Allchin: Buy Vista for the security,” http://news.com.com/Allchin+Buy+Vista+for+the+security/2100-1012_3-6032344.html?tag=st.prev. January 2006.
18.189.44.52