Bibliography
[biblio01_001] (Microsoft 2002) Trustworthy Computing site, http://www.microsoft.com/mscorp/twc/default.mspx.
[biblio01_002] (APWG 2006) Anti-Phishing Working Group, http://www.antiphishing.org/.
[biblio01_003] (Clark and Davis 1995) and “A Human Capital Perspective on Criminal Careers,” Journal of Applied Business Research, , no 3. 1995, pp. 58–64.
[biblio01_004] (FBI 2005) “FBI Announces Two Arrests in Mytob and Zotob Computer Worm Investigation,” http://www.fbi.gov/pressrel/pressrel05/zotob_release082605.htm. August 2005.
[biblio01_005] (CNN 2003) “Teenager arrested in ‘Blaster’ Internet attack,” http://www.cnn.com/2003/TECH/internet/08/29/worm.arrest/. August 2003.
[biblio01_006] (eWeek 2004) “App Developers ...
Get Security Development Lifecycle now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.