Bibliography

Chapter 1

Footnotes

  1. MIMOSO, MICHAEL & THREATPOST, THE KASPERSKY LAB SECURITY NEWS SERVICE. (2013). BREACH Compression Attack Steals HTTPS Secrets in Under 30 Seconds. [Online] 5th August 2013. Available from: http://threatpost.com/breach-compression-attack-steals-https-secrets-in-under-30-seconds/101579.
  2. FISHER, DENNIS & THREATPOST, THE KASPERSKY LAB SECURITY NEWS. (2013). Most Surprising NSA Capability: Defeating the Collective Security Prowess of Silicon Valley. [Online] 30th December 2013. Available from: http://threatpost.com/the-year-in-nsa/103329.
  3. SYMANTEC CORPORATION. (2014). 2013 Norton Report. [Online] Available from: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013
  4. INTERNATIONAL ...

Get The InfoSec Handbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.