O'Reilly logo

Security Development Lifecycle by Steve Lipner, Michael Howard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

[biblio11_01] (Microsoft 2005) Microsoft Corporation. “Data Execution Protection,” http://msdn.microsoft.com/library/en-us/memory/base/data_execution_prevention.asp. MSDN, December 2005.

[biblio11_02] (Cigital 2000) Cigital, Inc. “ITS4: Software Security Tool,” http://www.cigital.com/its4/. February 2000.

[biblio11_03] (Azario 2002) Azario,Jos. “Source Code Scanners for Better Code,” http://www.linuxjournal.com/article/5673. Linux Journal, January 2002.

[biblio11_04] (Lemos 2005) Lemos,Robert. “Study: Few bugs in MySQL database,” http://news.com.com/Study+Few+bugs+in+MySQL+database/2100-1002_3-5563918.html. CNET News.com, February 2005.

[biblio11_05] (OSVDB 2004) Open Source Vulnerability Database. “MySQL ALTER TABLE/RENAME Forces Old ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required