[biblio07_01] (Saltzer and Schroeder 1975) and “The Protection of Information in Computer Systems,” http://web.mit.edu/Saltzer/www/publications/protection/index.html. 1975.
[biblio07_02] (Computer Security Resource Center 2002) “Early Computer Security Papers, Part I,” http://csrc.nist.gov/publications/history/index.html. June 2002.
[biblio07_03] (Yan and Randell 2005) and “Security in Computer Games: From Pong to Online Poker,” http://www.cs.ncl.ac.uk/research/pubs/authors/byType.php?id=408. February 2005.
[biblio07_04] (Anderson 2001) Security Engineering: A Guide to Building Dependable Distributed Systems. New York, NY: John Wiley & Sons, 2001.
[biblio07_06] (Howard and LeBlanc 2003) and Writing Secure Code, Second Edition. Redmond, WA: Microsoft Press, 2003.
[biblio07_07] (Rescorla and Korver 2003) and “Guidelines for Writing RFC Text on Security Considerations,” ftp://ftp.rfc-editor.org/in-notes/rfc3552.txt. RFC 3552, July 2003.
[biblio07_08] (Wikipedia 2006) “Kerchoff’s Law,” http://en.wikipedia.org/wiki/Kerchoffs_law.
[biblio07_09] (McCabe and Watson 1994) and “Software Complexity,” http://www.stsc.hill.af.mil/crosstalk/1994/12/xt94d12b.asp. Crosstalk, December 1994.
[biblio07_10] (VanDoren 2000) “Cyclomatic Complexity,” http://www.sei.cmu.edu/str/descriptions/cyclomatic.html. July 2000.
[biblio07_11] (VanDoren 1997) “Halstead Complexity Measures,” http://www.sei.cmu.edu/str/descriptions/halstead.html. January 1997.
[biblio07_12] (Microsoft 2004) Microsoft Security Bulletin MS04-030. “Vulnerability in WebDAV XML Message Handler Could Lead to a Denial of Service,” http://www.microsoft.com/technet/security/bulletin/ms04-030.mspx. October 2004.
[biblio07_13] (Microsoft 2005a) “Malicious Software Encyclopedia: Win32/Sasser,” http://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32%2fSasser. January 2005.
[biblio07_14] (Microsoft 2005b) “Malicious Software Encyclopedia: Win32/Zotob,” http://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32%2fzotob. November 2005.
[biblio07_15] (Microsoft 2006) “Using the Checkv4.exe Utility,” http://msdn.microsoft.com/library/en-us/winsock/winsock/using_the_checkv4_exe_utility_2.asp. MSDN, January 2006.
[biblio07_16] (Microsoft 2005c) “Privileges,” http://msdn.microsoft.com/library/en-us/secauthz/security/privileges.asp. MSDN, December 2005.
[biblio07_17] (Rich 2005) “The Least Privilege Model in the Solaris 10 OS,” http://www.sun.com/bigadmin/features/articles/least_privilege.html. February 2005.
[biblio07_18] (Solar and Mondi 2005) and “POSIX Capabilities,” http://www.gentoo.org/proj/en/hardened/capabilities.xml. January 2005.
[biblio07_19] (Microsoft 2002) “SiteLock Template 1.04 for ActiveX Controls,” http://msdn.microsoft.com/archive/en-us/samples/internet/components/sitelock/default.asp. MSDN, May 2002.