Symbian OS Platform Security/References
From Franklin Heath Ltd Wiki
- Adams, Carlisle, and Lloyd, Steve (2003)
- Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edition, Addison-Wesley, ISBN 978-0-672-32391-1.
- Anderson, James P. (1972)
- Computer Security Technology Planning Study, ESDTR-73-51, US Air Force Electronic Systems Division, October.
- Anderson, Ross (2001)
- Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, ISBN 978-0-471-38922-4.
- Biddle, Peter, et al. (2003)
- ‘The Darknet and the Future of Content Protection’, in Digital Rights Management: Technological, Economic, Legal and Political Aspects, Springer-Verlag, ISBN 978-3-540-40465-1, pp. 344-365.
- Bostrom, Nick (2003)
- ‘Are You Living in a Computer Simulation?’, Philosophical Quarterly 53:211, Blackwell, pp 243-255.</span>
- Computer Industry Almanac, Inc. (2005)
- Press Release, http://www.c-i-a.com/pr0305.htm, 9 March.
- Dennis, Jack B., and Van Horn, Earl C. (1966)
- ‘Programming Semantics for Multiprogrammed Computations’, in Communications of the ACM 9:3, March.
- Gowdiak, Adam (2004)
- Java 2 Micro Edition Security Vulnerabilities, presented at Hack-in-the-Box Security Conference, Kuala Lumpur, October.
- Harrison, Richard (2003)
- Symbian OS C++ for Mobile Phones, Wiley, ISBN 978-0-470-85611-6.
- Harrison, Richard (2004)
- Symbian OS C++ for Mobile Phones, Volume 2, Wiley, ISBN 978-0-470-87108-9.
- Holmes, Phil (2002)
- An Introduction to Boundaryless Information Flow, electronic publication, The Open Group, July.
- Juvenal, Decimus J. (c.100CE)
- Satire VI.
- Kerckhoffs, Auguste (1883)
- ‘La Cryptographie Militaire’, in Journal des Sciences Militaires IX, January/February.
- McGraw, Gary, and Felten, Edward W. (1999)
- Securing Java, Wiley, ISBN 978-0-471-31952-8.
- Miller, Stanley A. (2005)
- When nature calls, cell phone owners should answer carefully, Associated Press, 4th April.
- Odlyzko, Andrew M. (2001)
- ‘Content is Not King’, in First Monday 6:2, http://www.firstmonday.org/issues/issue6_2, February.
- Sales, Jane (2005)
- Symbian OS Internals: Real Time Kernel Programming, Wiley, ISBN 978-0-470-02524-6.
- Saltzer, Jerome H., and Schroeder, Michael D. (1975)
- ‘The Protection of Information in Computer Systems’, in Proceedings of the IEEE 63:9, September, pp. 1278-1308.
- Schneier, Bruce (1996)
- Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, Wiley, ISBN 978-0-471-12845-8.