References

[Aleph 1996] Aleph One. “Smashing the Stack for Fun and Profit.” Phrack 7, no. 49 (1996). www.phrack.org/issues.html?issue=49&id=14..

[Alexander 2003] Alexander, I. “Misuse Cases: Use Cases with Hostile Intent.” IEEE Software 20, no.1 (2003): 58–66.

[Alexandrescu 2010] Alexandrescu, A. The D Programming Language. Boston: Addison-Wesley, 2010.

[Alhazmi 2005a] Alhazmi, O. H., and Y. K. Malaiya. “Modeling the Vulnerability Discovery Process.” In Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering: ISSRE 2005, Chicago, November 8–11, 2005. Los Alamitos, CA: IEEE Computer Society Press, 2005.

[Alhazmi 2005b] Alhazmi, O., Y. K. Malaiya, and I. K. Ray. Security Vulnerabilities in Software Systems: A Quantitative ...

Get Secure Coding in C and C++, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.