References
[Aleph One 96] Aleph One. Smashing the Stack for Fun and Profit.Phrack 49, Volume Seven, Issue Forty-Nine File 14 of 16 (1996). http://www.phrack.org/phrack/49/P49-14.
[Alexander 03] Alexander, I. Misuse Cases: Use Cases with Hostile Intent. IEEE Software 20, 1 (January/February 2003): 58–66.
[Alhazmi 05] Alhazmi, O., Y. K. Malaiya, and I. K. Ray. Security Vulnerabilities in Software Systems: A Quantitative Perspective Technical Report, CS T&R, AMR05. Fort Collins, CO: Computer Science Department, Colorado State University, 2005.
[Allen 01] Allen, J. H. The CERT Guide to System and Network Security Practices. Boston: Addison-Wesley, 2001.
[Andersen 04] Andersen, D., et al. Preliminary System Dynamics Maps of the Insider Cyber-threat ...
Get Secure Coding in C and C++ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.