Bibliography
[biblio07_01] (Saltzer and Schroeder 1975) and “The Protection of Information in Computer Systems,” http://web.mit.edu/Saltzer/www/publications/protection/index.html. 1975.
[biblio07_02] (Computer Security Resource Center 2002) “Early Computer Security Papers, Part I,” http://csrc.nist.gov/publications/history/index.html. June 2002.
[biblio07_03] (Yan and Randell 2005) and “Security in Computer Games: From Pong to Online Poker,” http://www.cs.ncl.ac.uk/research/pubs/authors/byType.php?id=408. February 2005.
[biblio07_04] (Anderson 2001) Security Engineering: A Guide to Building Dependable Distributed Systems. New York, NY: John Wiley & Sons, 2001.
[biblio07_05]
Get Security Development Lifecycle now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.