References
[Aho et al., 2006] Aho, Alfred V., Ravi Sethi, Jeffrey D. Ullman, Monica Lam. Compilers: Principles, Techniques, and Tools, 2nd Edition. Boston, MA: Addison-Wesley, 2006.
[Andersen, 2005] “Memory Protection Technologies.” 2005. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2mempr.mspx.
[Anderson, 2001] Anderson, Ross. Security Engineering. New York, NY: Wiley, 2001.
[Appel, 1998] Appel, Andrew W. Modern Compiler Implementation in Java. Cambridge England: Cambridge University Press, 1998.
[Arkin et al., 2001] Arkin, B., F. Hill, S. Marks, M. Schmid, T. Walls. “How We Learned to Cheat at Online Poker: A Study in Software Security.” 2001. http://www.cigital.com/papers/download/developer_gambling.php.
[Ashcraft and Engler, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access