Bibliography

Berners-Lee,T., Fielding,R., and Frystyk,H. “Request for Comments (RFC) 1945: Hypertext Transfer Protocol HTTP/1.0.” Internet Engineering Task Force (IETF), 1996.

Bishop,M. Computer Security: Art & Science. Addison-Wesley, 2003.

Brown,K. Programming Windows Security. Addison-Wesley, 2000.

Brown,K. The .NET Developer’s Guide to Windows Security. Addison-Wesley, 2005.

Chen,H., Wagner,D., and Dean,D. “Setuid Demystified.” In Proceedings of the Eleventh Usenix Security Symposium. San Francisco, 2002.

Eddon,G. and Eddon,H. Inside Distributed COM. Microsoft Press, 1998.

Ferguson,N. and Schneier,B. Practical Cryptography. Wiley Publishing, Inc., 2003.

Fielding,R., et al. (1999). “Request for Comments (RFC) 2616: Hypertext Transfer Protocol ...

Get The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.