References

“About Licenses” (Creative Commons, n.d.). http://creativecommons.org/about/licenses/ (accessed May 12, 2010).

“About the Security Content of iPhone OS 3.0.1,” article HT3754 (Apple Support, July 31, 2009). http://support.apple.com/kb/HT3754 (accessed May 16, 2010).

Alberts, Christopher, and Audrey Dorofee. Managing Information Security Risks: The OCTAVE Approach. Boston: Addison-Wesley, 2003.

Alhadidi, D., M. Debbabi, and P. Bhattacharya. “New AspectJ Pointcuts for Integer Overflow and Underflow Detection.” Information Security Journal: A Global Perspective 17, no. 5/6 (2008): 278–287.

“An ‘Apples to Apples’ Comparison of the Top Providers of Online Fax Services” (FaxCompare.com, 2010). http://www.faxcompare.com/ (assessed May 5, ...

Get Internet Security: How to Defend Against Attackers on the Web, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.