Bibliography

[biblio11_01] (Microsoft 2005) Microsoft Corporation. “Data Execution Protection,” http://msdn.microsoft.com/library/en-us/memory/base/data_execution_prevention.asp. MSDN, December 2005.

[biblio11_02] (Cigital 2000) Cigital, Inc. “ITS4: Software Security Tool,” http://www.cigital.com/its4/. February 2000.

[biblio11_03] (Azario 2002) Azario,Jos. “Source Code Scanners for Better Code,” http://www.linuxjournal.com/article/5673. Linux Journal, January 2002.

[biblio11_04] (Lemos 2005) Lemos,Robert. “Study: Few bugs in MySQL database,” http://news.com.com/Study+Few+bugs+in+MySQL+database/2100-1002_3-5563918.html. CNET News.com, February 2005.

[biblio11_05] (OSVDB 2004) Open Source Vulnerability Database. “MySQL ALTER TABLE/RENAME Forces Old ...

Get Security Development Lifecycle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.