Bibliography

  1. Abrams, Marshall D., Sushil G. Jajodia, and Harold J. Podell. Information security: an integrated collection of essays. IEEE computer society press, 1995
  2. ACM (Association for Computing Machinery), Turing Award Citation, 2013, amturing.acm.org/award_winners/lamport_1205376.cfm
  3. ACM Code 2018 Task Force, ACM Code of Ethics and Professional Conduct, 2018, www.acm.org/code-of-ethics
  4. Adkins, Heather, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, and Adam Stubblefield. Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems. O'Reilly Media, 2020
  5. Aleph1, “Smashing the stack for fun and profit.” Phrack magazine 49 1996‐11‐08, phrack.org/issues/49/14.html
  6. Amoroso, Edward G. Fundamentals of Computer Security Technology. Prentice‐Hall, Inc., 1994
  7. Amazon, aws.amazon.com/macie, last visited November 24, 2017
  8. Amazon, Summary of the AWS Service Event in the Northern Virginia (US‐EAST‐1) Region, AWS Blog, December 10, 2021, aws.amazon.com/message/12721
  9. Amazon Seller Central, “Restricted Products” sellercentral.amazon.com/gp/help/external/200164330, last visited August 15, 2019
  10. Anderson, Ross, Trojan Source: Invisible Vulnerabilities, Light Blue Touchpaper, November 1, 2021, www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities
  11. Anley, Chris, John Heasman, Felix Lindner, and Gerardo Richarte. The Shellcoder's Handbook: Discovering and Exploiting Security Holes. John Wiley & Sons, 2011
  12. AntiCompositeNumber ...

Get Threats now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.