Works Cited

Chapter 1

“BGC Partners Using BeyondTrust Privilege Manager to Secure 6,000 Desktops.” 2010.

Vijayan, J. “Three Fired for Accessing Records of Tucson Shooting Victims,” ComputerWorld (2011).

Hill, K. “Hacker Fail: Two College Kids Discover Police Are Not as ‘Dumb’ As They Thought.” 2010. Forbes.com.

Carpenter, P. “Net-it-Out” Presentation: Gartner Information Security Summit. Gartner, Inc., 2010. n. pag. Print.

National Security Council, “The Comprehensive National Cybersecurity Initiative.” 2011.

Witosky, T. “Iowa Hospital Investigating Possible Breach of Players' Records,” USA Today (2011).

Chapter 2

Offensive Security, Adobe Shockwave Player rcsL Chunk Memory Corruption 0day. 2010.

Arkansas State University. “Arkansas State University, ...

Get Preventing Good People from Doing Bad Things: Implementing Least Privilege now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.