Symbian OS Platform Security/References

From Franklin Heath Ltd Wiki
Jump to: navigation, search
Adams, Carlisle, and Lloyd, Steve (2003)
Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edition, Addison-Wesley, ISBN 978-0-672-32391-1.
Anderson, James P. (1972)
Computer Security Technology Planning Study, ESDTR-73-51, US Air Force Electronic Systems Division, October.
Anderson, Ross (2001)
Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, ISBN 978-0-471-38922-4.
Biddle, Peter, et al. (2003)
‘The Darknet and the Future of Content Protection’, in Digital Rights Management: Technological, Economic, Legal and Political Aspects, Springer-Verlag, ISBN 978-3-540-40465-1, pp. 344-365.
Bostrom, Nick (2003)
‘Are You Living in a Computer Simulation?’, Philosophical Quarterly 53:211, Blackwell, pp 243-255.</span>
Computer Industry Almanac, Inc. (2005)
Press Release,, 9 March.
Dennis, Jack B., and Van Horn, Earl C. (1966)
‘Programming Semantics for Multiprogrammed Computations’, in Communications of the ACM 9:3, March.
Gowdiak, Adam (2004)
Java 2 Micro Edition Security Vulnerabilities, presented at Hack-in-the-Box Security Conference, Kuala Lumpur, October.
Harrison, Richard (2003)
Symbian OS C++ for Mobile Phones, Wiley, ISBN 978-0-470-85611-6.
Harrison, Richard (2004)
Symbian OS C++ for Mobile Phones, Volume 2, Wiley, ISBN 978-0-470-87108-9.
Holmes, Phil (2002)
An Introduction to Boundaryless Information Flow, electronic publication, The Open Group, July.
Juvenal, Decimus J. (c.100CE)
Satire VI.
Kerckhoffs, Auguste (1883)
‘La Cryptographie Militaire’, in Journal des Sciences Militaires IX, January/February.
McGraw, Gary, and Felten, Edward W. (1999)
Securing Java, Wiley, ISBN 978-0-471-31952-8.
Miller, Stanley A. (2005)
When nature calls, cell phone owners should answer carefully, Associated Press, 4th April.
Odlyzko, Andrew M. (2001)
‘Content is Not King’, in First Monday 6:2,, February.
Sales, Jane (2005)
Symbian OS Internals: Real Time Kernel Programming, Wiley, ISBN 978-0-470-02524-6.
Saltzer, Jerome H., and Schroeder, Michael D. (1975)
‘The Protection of Information in Computer Systems’, in Proceedings of the IEEE 63:9, September, pp. 1278-1308.
Schneier, Bruce (1996)
Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, Wiley, ISBN 978-0-471-12845-8.