Bibliography
- Abrams, Marshall D., Sushil G. Jajodia, and Harold J. Podell. Information security: an integrated collection of essays. IEEE computer society press, 1995
- ACM (Association for Computing Machinery), Turing Award Citation, 2013,
amturing.acm.org/award_winners/lamport_1205376.cfm
- ACM Code 2018 Task Force, ACM Code of Ethics and Professional Conduct, 2018,
www.acm.org/code-of-ethics
- Adkins, Heather, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, and Adam Stubblefield. Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems. O'Reilly Media, 2020
- Aleph1, “Smashing the stack for fun and profit.” Phrack magazine 49 1996‐11‐08,
phrack.org/issues/49/14.html
- Amoroso, Edward G. Fundamentals of Computer Security Technology. Prentice‐Hall, Inc., 1994
- Amazon,
aws.amazon.com/macie
, last visited November 24, 2017 - Amazon, Summary of the AWS Service Event in the Northern Virginia (US‐EAST‐1) Region, AWS Blog, December 10, 2021,
aws.amazon.com/message/12721
- Amazon Seller Central, “Restricted Products”
sellercentral.amazon.com/gp/help/external/200164330
, last visited August 15, 2019 - Anderson, Ross, Trojan Source: Invisible Vulnerabilities, Light Blue Touchpaper, November 1, 2021,
www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities
- Anley, Chris, John Heasman, Felix Lindner, and Gerardo Richarte. The Shellcoder's Handbook: Discovering and Exploiting Security Holes. John Wiley & Sons, 2011
- AntiCompositeNumber ...
Get Threats now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.