O'Reilly logo

Security Development Lifecycle by Steve Lipner, Michael Howard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

[biblio01_001] (Microsoft 2002) Trustworthy Computing site, http://www.microsoft.com/mscorp/twc/default.mspx.

[biblio01_002] (APWG 2006) Anti-Phishing Working Group, http://www.antiphishing.org/.

[biblio01_003] (Clark and Davis 1995) Clark,J.R., and W.L.Davis. “A Human Capital Perspective on Criminal Careers,” Journal of Applied Business Research, volume 11, no 3. 1995, pp. 58–64.

[biblio01_004] (FBI 2005) “FBI Announces Two Arrests in Mytob and Zotob Computer Worm Investigation,” http://www.fbi.gov/pressrel/pressrel05/zotob_release082605.htm. August 2005.

[biblio01_005] (CNN 2003) “Teenager arrested in ‘Blaster’ Internet attack,” http://www.cnn.com/2003/TECH/internet/08/29/worm.arrest/. August 2003.

[biblio01_006] (eWeek 2004) “App Developers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required