References
“About Licenses” (Creative Commons, n.d.). http://creativecommons.org/about/licenses/ (accessed May 12, 2010).
“About the Security Content of iPhone OS 3.0.1,” article HT3754 (Apple Support, July 31, 2009). http://support.apple.com/kb/HT3754 (accessed May 16, 2010).
Alberts, Christopher, and Audrey Dorofee. Managing Information Security Risks: The OCTAVE Approach. Boston: Addison-Wesley, 2003.
Alhadidi, D., M. Debbabi, and P. Bhattacharya. “New AspectJ Pointcuts for Integer Overflow and Underflow Detection.” Information Security Journal: A Global Perspective 17, no. 5/6 (2008): 278–287.
“An ‘Apples to Apples’ Comparison of the Top Providers of Online Fax Services” (FaxCompare.com, 2010). http://www.faxcompare.com/ (assessed May 5, ...