Bibliography

[biblio05_01] (Microsoft 2002) Microsoft Corporation. Bill Gates’s Trustworthy Computing memo, http://news.com.com/2009-1001-817210.html. January 2002.

[biblio05_02] (Howard and LeBlanc 2003) Howard,Michael, and DavidLeBlanc. Writing Secure Code, Second Edition. Redmond, WA: Microsoft Press, 2003.

[biblio05_03] (Wikipedia 2006a) “Bell-LaPadula Model,” http://en.wikipedia.org/wiki/Bell-LaPadula_model.

[biblio05_04] (Wikipedia 2006b) “Biba Model,” http://en.wikipedia.org/wiki/Biba_model.

[biblio05_05] (Saltzer and Schroeder 1975) Saltzer,J.H., and M.D.Schroeder. “The Protection of Information in Computer Systems,” http://www.cs.virginia.edu/~evans/cs551/saltzer/. April 1975.

[biblio05_06] (Microsoft 2006a) Microsoft Corporation. “Microsoft Online Privacy Notice Highlights,” http://privacy.msn.com. January 2006.

[biblio05_07] (Microsoft 2006b) Microsoft E-Learning, Security Catalog, https://www.microsoftelearning.com/security/.

[biblio05_08] ((ISC)2 2006) CISSP CPE Credit Requirements, https://www.isc2.org/cgi-bin/cissp_content.cgi?page=89.

[biblio05_09] (Vigilar 2005) Vigilar, Inc. “Vigilar Launches ‘Writing Secure Code’ Training Class for Programmers,” http://www.vigilar.com/press48.html. August 2005.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset