Skip to Content
Internet Security: How to Defend Against Attackers on the Web, 2nd Edition
book

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

by Mike Harwood
July 2015
Intermediate to advanced
438 pages
14h 13m
English
Jones & Bartlett Learning
Content preview from Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

References

“About Licenses” (Creative Commons, n.d.). http://creativecommons.org/about/licenses/ (accessed May 12, 2010).

“About the Security Content of iPhone OS 3.0.1,” article HT3754 (Apple Support, July 31, 2009). http://support.apple.com/kb/HT3754 (accessed May 16, 2010).

Alberts, Christopher, and Audrey Dorofee. Managing Information Security Risks: The OCTAVE Approach. Boston: Addison-Wesley, 2003.

Alhadidi, D., M. Debbabi, and P. Bhattacharya. “New AspectJ Pointcuts for Integer Overflow and Underflow Detection.” Information Security Journal: A Global Perspective 17, no. 5/6 (2008): 278–287.

“An ‘Apples to Apples’ Comparison of the Top Providers of Online Fax Services” (FaxCompare.com, 2010). http://www.faxcompare.com/ (assessed May 5, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Davi Ottenheimer, Matthew Wallace
Hacker Techniques, Tools, and Incident Handling

Hacker Techniques, Tools, and Incident Handling

Sean-Philip Oriyano, Michael Gregg

Publisher Resources

ISBN: 9781284090550