Bibliography

[biblio22_01] (Microsoft 2005a) .NET Framework Developer’s Guide, “Demand vs. LinkDemand,” http://msdn2.microsoft.com/en-us/library/3ky50t49.aspx. MSDN, 2005.

[biblio22_02] (Brown 2001) Brown,Keith. “Security in .NET: Enforce Code Access Rights with the Common Language Runtime,” http://msdn.microsoft.com/msdnmag/issues/01/02/cas/. MSDN Magazine, February 2001.

[biblio22_03] (Microsoft 2005b) .NET Framework Developer’s Guide, “Using the Assert Method,” http://msdn2.microsoft.com/en-us/library/91wteedy.aspx. MSDN, 2005.

[biblio22_04] (Howard, LeBlanc, and Viega 2005) Howard,Michael, DavidLeBlanc, and JohnViega. 19 Deadly Sins of Software Development. New York, NY: McGraw-Hill, 2005. Chapter 15, “Improper File Access.”

[biblio22_05] (GNU ...

Get Security Development Lifecycle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.