O'Reilly logo

Building Secure Software: How to Avoid Security Problems the Right Way by Gary McGraw, John Viega

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

References

[Aleph, 1996] One, Aleph. Smashing the Stack for Fun and Profit. Phrack 49, November 1996.

[Arbaugh, 2000] Arbaugh, Bill, Bill Fithen, and John McHugh. Windows of Vulnerability: A Case Study Analysis. IEEE Computer, 33 (10), 2000.

[Atluri, 2000] Atluri, Vijay, Pierangela Samarati, eds. Security of Data and Transaction Processing. Kluwer Academic Publications, 2000.

[Balfanz, 2000] Balfanz, Dirk, and Drew Dean. A security infrastructure for distributed Java applications. In Proceedings of IEEE Symposium on Security and Privacy. Oakland, CA, 2000.

[Baratloo, 2000] Baratloo, Arash, Timothy Tsai, and Navjot Singh. Transparent run-time defense against stack smashing attacks. In Proceedings of the USENIX Annual Technical Conference, San ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required