Works Cited

Chapter 1

“BGC Partners Using BeyondTrust Privilege Manager to Secure 6,000 Desktops.” 2010.

Vijayan, J. “Three Fired for Accessing Records of Tucson Shooting Victims,” ComputerWorld (2011).

Hill, K. “Hacker Fail: Two College Kids Discover Police Are Not as ‘Dumb’ As They Thought.” 2010. Forbes.com.

Carpenter, P. “Net-it-Out” Presentation: Gartner Information Security Summit. Gartner, Inc., 2010. n. pag. Print.

National Security Council, “The Comprehensive National Cybersecurity Initiative.” 2011.

Witosky, T. “Iowa Hospital Investigating Possible Breach of Players' Records,” USA Today (2011).

Chapter 2

Offensive Security, Adobe Shockwave Player rcsL Chunk Memory Corruption 0day. 2010.

Arkansas State University. “Arkansas State University, ...

Get Preventing Good People from Doing Bad Things: Implementing Least Privilege now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.