Bibliography

[biblio11_01] (Microsoft 2005) Microsoft Corporation. “Data Execution Protection,” http://msdn.microsoft.com/library/en-us/memory/base/data_execution_prevention.asp. MSDN, December 2005.

[biblio11_02] (Cigital 2000) Cigital, Inc. “ITS4: Software Security Tool,” http://www.cigital.com/its4/. February 2000.

[biblio11_03] (Azario 2002) Azario,Jos. “Source Code Scanners for Better Code,” http://www.linuxjournal.com/article/5673. Linux Journal, January 2002.

[biblio11_04] (Lemos 2005) Lemos,Robert. “Study: Few bugs in MySQL database,” http://news.com.com/Study+Few+bugs+in+MySQL+database/2100-1002_3-5563918.html. CNET News.com, February 2005.

[biblio11_05] (OSVDB 2004) Open Source Vulnerability Database. “MySQL ALTER TABLE/RENAME Forces Old Permission Checks,” http://www.osvdb.org/displayvuln.php?osvdb_id=10660. October 2004.

[biblio11_06] (Microsoft 2003) Microsoft Corporation. Microsoft Security Bulletin MS03-026. “Buffer Overrun in RPC Interface Could Allow Code Execution,” http://www.microsoft.com/technet/security/Bulletin/MS03-026.mspx. TechNet, July 2003.

[biblio11_07] (Howard and LeBlanc 2003) Howard,Michael, and DavidLeBlanc. Writing Secure Code, Second Edition. Redmond, WA: Microsoft Press, 2003. Chapter 23, “General Good Practices.”

[biblio11_08] (Wheeler 2002) Wheeler,DavidA. Secure Programming for Linux and Unix HOWTO -- Creating Secure Software, published online. Chapter 7, “Structure Program Internals and Approach,” http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/avoid-race.html#TEMPORARY-FILES. Last updated June 3, 2002.

[biblio11_09] (OSVDB 2006) Open Source Vulnerability Database. Symlink Vulnerabilites, http://www.osvdb.org/searchdb.php?vuln_title=symlink. Last updated January 31, 2006.

[biblio11_10] (Howard, LeBlanc, and Viega 2005) Howard,Michael, DavidLeBlanc, and JohnViega. 19 Deadly Sins of Software Security. New York, NY: McGraw-Hill, 2005. Chapter 3, “Integer Overflows.”

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset