Bibliography

[biblio15_01] (Karger et al. 1991) Karger,P.A., M.E.Zurko, D.W.Bonin, A.H.Mason, and C.E.Kahn. “A Retrospective on the VAX VMM Security Kernel,” Transactions on Software Engineering, 17(11):1147–1165. November 1991.

[biblio15_02] (Eichlin and Rochlis 1989) Eichlin,M.W., and J.A.Rochlis. “With microscope and tweezers: An analysis of the Internet virus of November 1988,” Proceedings of the IEEE Computer Society Symposium on Security and Privacy, pp. 326–345, Oakland, CA, May 1989.

[biblio15_03] (CERT 2002) Carnegie Mellon Software Engineering Institute, CERT Coordination Center. “CERT Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP),” http://www.cert.org/advisories/CA-2002-03.html. February 2002.

[biblio15_04] (Microsoft 2004a) Microsoft Security Bulletin MS04-007. “ASN.1 Vulnerability Could Allow Code Execution (828028),” http://www.microsoft.com/technet/security/Bulletin/MS04-007.mspx. February 2004.

[biblio15_05] (Microsoft 2000a) “Information on Cross-Site Scripting Security Vulnerability,” http://www.microsoft.com/technet/archive/security/news/crssite.mspx?mfr=true. February 2000.

[biblio15_06] (Microsoft 2005) Microsoft Security Bulletin MS05-029. “Vulnerability in Outlook Web Access for Exchange Server 5.5 Could Allow Cross-Site Scripting Attacks (895179),” http://www.microsoft.com/technet/security/Bulletin/ms05-029.mspx. June 2005.

[biblio15_07] (eWeek 2005) Roberts,PaulF. “Microsoft Scraps Old Encryption in New Code,” http://www.eweek.com/article2/0,1895,1859751,00.asp. September 2005.

[biblio15_08] (Microsoft 2000b) “Outlook Email Security Update Now Available,” http://www.microsoft.com/presspass/features/2000/jun00/06-08outlook.mspx. Microsoft PressPass, June 2000.

[biblio15_09] (Naraine 2004) Naraine,Ryan. “Malware Hacker Attack Linked to Spammers,” http://www.internetnews.com/security/article.php/3373581. InternetNews.Com, June 2004.

[biblio15_10] (Koetzle et al. 2004) Koetzle, Laura, Charles Rutstein, Natalie Lambert, and Stephanie Wenninger, Forrester Research. “Is Linux More Secure Than Windows?” http://www.forrester.com/Research/Document/Excerpt/0,7211,33941,00.html. March 2004. Or http://download.microsoft.com/download/9/c/7/9c793b76-9eec-4081-98ef-f1d0ebfffe9d/LinuxWindowsSecurity.pdf.

[biblio15_11] (SecurityFocus 2005) BugTraq, http://www.securityfocus.com/archive/1/description.

[biblio15_12] (Cartwright 2002) Cartwright,John. [Full-Disclosure] Mailing List Charter, http://lists.grok.org.uk/full-disclosure-charter.html. Created July 2002.

[biblio15_13] (Microsoft 2003a) Microsoft Security Bulletin MS03-026. “Buffer Overrun in RPC Interface Could Allow Code Execution (823980),” http://www.microsoft.com/technet/security/Bulletin/MS03-026.mspx. July 2003.

[biblio15_14] (Microsoft 2003b) Microsoft Security Bulletin MS03-039. “Buffer Overrun in RPCSS Service Could Allow Code Execution (824146),” http://www.microsoft.com/technet/security/Bulletin/MS03-039.mspx. September 2003.

[biblio15_15] (Microsoft 2004b) Microsoft Security Bulletin MS04-012. “Cumulative Update for Microsoft RPC/DCOM (828741),” http://www.microsoft.com/technet/security/Bulletin/MS04-012.mspx. April 2004.

[biblio15_16] (ZDNet 2006) Espiner,Tom. “Microsoft to lift lid on hacker conference,” http://news.zdnet.co.uk/0,39020330,39257971,00.htm. March 2006.

[biblio15_17] (Microsoft 2006) Microsoft Security Bulletin MS06-001. “Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919),” http://www.microsoft.com/technet/security/Bulletin/MS06-001.mspx. January 2006.

[biblio15_18] (Microsoft 2001) Microsoft Security Bulletin MS01-017. “Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard,” http://www.microsoft.com/technet/security/Bulletin/MS01-017.mspx. March 2001.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset