O'Reilly logo

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Justin Schuh, John McDonald, Mark Dowd

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

Berners-Lee,T., Fielding,R., and Frystyk,H. “Request for Comments (RFC) 1945: Hypertext Transfer Protocol HTTP/1.0.” Internet Engineering Task Force (IETF), 1996.

Bishop,M. Computer Security: Art & Science. Addison-Wesley, 2003.

Brown,K. Programming Windows Security. Addison-Wesley, 2000.

Brown,K. The .NET Developer’s Guide to Windows Security. Addison-Wesley, 2005.

Chen,H., Wagner,D., and Dean,D. “Setuid Demystified.” In Proceedings of the Eleventh Usenix Security Symposium. San Francisco, 2002.

Eddon,G. and Eddon,H. Inside Distributed COM. Microsoft Press, 1998.

Ferguson,N. and Schneier,B. Practical Cryptography. Wiley Publishing, Inc., 2003.

Fielding,R., et al. (1999). “Request for Comments (RFC) 2616: Hypertext Transfer Protocol ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required