Bibliography

Chapter 1

Footnotes

  1. MIMOSO, MICHAEL & THREATPOST, THE KASPERSKY LAB SECURITY NEWS SERVICE. (2013). BREACH Compression Attack Steals HTTPS Secrets in Under 30 Seconds. [Online] 5th August 2013. Available from: http://threatpost.com/breach-compression-attack-steals-https-secrets-in-under-30-seconds/101579.
  2. FISHER, DENNIS & THREATPOST, THE KASPERSKY LAB SECURITY NEWS. (2013). Most Surprising NSA Capability: Defeating the Collective Security Prowess of Silicon Valley. [Online] 30th December 2013. Available from: http://threatpost.com/the-year-in-nsa/103329.
  3. SYMANTEC CORPORATION. (2014). 2013 Norton Report. [Online] Available from: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013
  4. INTERNATIONAL ...

Get The InfoSec Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.