Bibliography

[biblio05_01] (Microsoft 2002) Microsoft Corporation. Bill Gates’s Trustworthy Computing memo, http://news.com.com/2009-1001-817210.html. January 2002.

[biblio05_02] (Howard and LeBlanc 2003) Howard,Michael, and DavidLeBlanc. Writing Secure Code, Second Edition. Redmond, WA: Microsoft Press, 2003.

[biblio05_03] (Wikipedia 2006a) “Bell-LaPadula Model,” http://en.wikipedia.org/wiki/Bell-LaPadula_model.

[biblio05_04] (Wikipedia 2006b) “Biba Model,” http://en.wikipedia.org/wiki/Biba_model.

[biblio05_05] (Saltzer and Schroeder 1975) Saltzer,J.H., and M.D.Schroeder. “The Protection of Information in Computer Systems,” http://www.cs.virginia.edu/~evans/cs551/saltzer/. April 1975.

[biblio05_06] (Microsoft 2006a) Microsoft Corporation. “Microsoft ...

Get Security Development Lifecycle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.