O'Reilly logo

Preventing Good People from Doing Bad Things: Implementing Least Privilege by Brian Anderson, John Mutch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Works Cited

Chapter 1

“BGC Partners Using BeyondTrust Privilege Manager to Secure 6,000 Desktops.” 2010.

Vijayan, J. “Three Fired for Accessing Records of Tucson Shooting Victims,” ComputerWorld (2011).

Hill, K. “Hacker Fail: Two College Kids Discover Police Are Not as ‘Dumb’ As They Thought.” 2010. Forbes.com.

Carpenter, P. “Net-it-Out” Presentation: Gartner Information Security Summit. Gartner, Inc., 2010. n. pag. Print.

National Security Council, “The Comprehensive National Cybersecurity Initiative.” 2011.

Witosky, T. “Iowa Hospital Investigating Possible Breach of Players' Records,” USA Today (2011).

Chapter 2

Offensive Security, Adobe Shockwave Player rcsL Chunk Memory Corruption 0day. 2010.

Arkansas State University. “Arkansas State University, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required