Bibliography

[biblio07_01] (Saltzer and Schroeder 1975) Saltzer,JeromeH., and MichaelD.Schroeder. “The Protection of Information in Computer Systems,” http://web.mit.edu/Saltzer/www/publications/protection/index.html. 1975.

[biblio07_02] (Computer Security Resource Center 2002) “Early Computer Security Papers, Part I,” http://csrc.nist.gov/publications/history/index.html. June 2002.

[biblio07_03] (Yan and Randell 2005) Yan,J., and B.Randell. “Security in Computer Games: From Pong to Online Poker,” http://www.cs.ncl.ac.uk/research/pubs/authors/byType.php?id=408. February 2005.

[biblio07_04] (Anderson 2001) Anderson,Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. New York, NY: John Wiley & Sons, 2001.

[biblio07_05]

Get Security Development Lifecycle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.