Appendix B. References
This appendix lists some additional sources of information that are referenced in the book, as well as some sources that were not referenced but might be helpful.
Chapter 1: Introduction to Performing Security Assessments
The Common Vulnerabilities and Exposures (CVE) index and security bulletins from software vendors: http://cve.mitre.org
Chapter 2: Key Principles of Security
"The Ten Immutable Laws of Security" at http://www.microsoft.com/technet/archive/community/columns/security/essays/10imlaws.mspx
"The Definition of a Security Vulnerability" at http://www.microsoft.com/technet/archive/community/columns/security/essays/vulnrbl.mspx
Writing Secure Code, Second Edition, by Michael Howard and David LeBlanc (Microsoft Press, ...
Get Assessing Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.