References

[Aho et al., 2006] Aho, Alfred V., Ravi Sethi, Jeffrey D. Ullman, Monica Lam. Compilers: Principles, Techniques, and Tools, 2nd Edition. Boston, MA: Addison-Wesley, 2006.

[Andersen, 2005] “Memory Protection Technologies.” 2005. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2mempr.mspx.

[Anderson, 2001] Anderson, Ross. Security Engineering. New York, NY: Wiley, 2001.

[Appel, 1998] Appel, Andrew W. Modern Compiler Implementation in Java. Cambridge England: Cambridge University Press, 1998.

[Arkin et al., 2001] Arkin, B., F. Hill, S. Marks, M. Schmid, T. Walls. “How We Learned to Cheat at Online Poker: A Study in Software Security.” 2001. http://www.cigital.com/papers/download/developer_gambling.php.

[Ashcraft and Engler, ...

Get Secure Programming with Static Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.