References

[1] 90210, “Bypassing Klister 0.4 with No Hooks or Running a Controlled Thread Scheduler,” 29A magazine 8 (2004).

[2] F. W. Abagnale, Stealing Your Life: The Ultimate Identity Theft Prevention Plan (Broadway Books, 2007).

[3] AdBrite, http://www.adbrite.com.

[4] AdWatcher, http://www.adwatcher.com.

[5] M. Alexander, “Your Medical Records Stolen,” Reader’s Digest, Nov. 2006, 86–93.

[6] A. Alsaid and C. J. Mitchell, “Preventing Phishing Attacks Using Trusted Computing Technology,” in Proceedings of the 6th International Network Conference (INC ’06), July 2006, 221–228.

[7] T. Alves and D. Felton, “TrustZone: Integrated Hardware and Software Security—Enabling Trusted Computing in Embedded Systems” (white paper, ARM, July 2004), http://www.arm.com/pdfs/TZ\_Whitepaper.pdf ...

Get Crimeware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.