References

[Aleph One 96] Aleph One. Smashing the Stack for Fun and Profit.Phrack 49, Volume Seven, Issue Forty-Nine File 14 of 16 (1996). http://www.phrack.org/phrack/49/P49-14.

[Alexander 03] Alexander, I. Misuse Cases: Use Cases with Hostile Intent. IEEE Software 20, 1 (January/February 2003): 58–66.

[Alhazmi 05] Alhazmi, O., Y. K. Malaiya, and I. K. Ray. Security Vulnerabilities in Software Systems: A Quantitative Perspective Technical Report, CS T&R, AMR05. Fort Collins, CO: Computer Science Department, Colorado State University, 2005.

[Allen 01] Allen, J. H. The CERT Guide to System and Network Security Practices. Boston: Addison-Wesley, 2001.

[Andersen 04] Andersen, D., et al. Preliminary System Dynamics Maps of the Insider Cyber-threat ...

Get Secure Coding in C and C++ now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.