<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.franklinheath.co.uk/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
		<id>http://wiki.franklinheath.co.uk/index.php?action=history&amp;feed=atom&amp;title=Symbian_OS_Platform_Security%2FReferences</id>
		<title>Symbian OS Platform Security/References - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.franklinheath.co.uk/index.php?action=history&amp;feed=atom&amp;title=Symbian_OS_Platform_Security%2FReferences"/>
		<link rel="alternate" type="text/html" href="http://wiki.franklinheath.co.uk/index.php?title=Symbian_OS_Platform_Security/References&amp;action=history"/>
		<updated>2026-05-21T17:23:21Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.23.17</generator>

	<entry>
		<id>http://wiki.franklinheath.co.uk/index.php?title=Symbian_OS_Platform_Security/References&amp;diff=456&amp;oldid=prev</id>
		<title>Craig: ISBN formatting</title>
		<link rel="alternate" type="text/html" href="http://wiki.franklinheath.co.uk/index.php?title=Symbian_OS_Platform_Security/References&amp;diff=456&amp;oldid=prev"/>
				<updated>2011-01-20T17:00:20Z</updated>
		
		<summary type="html">&lt;p&gt;ISBN formatting&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 17:00, 20 January 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;AdamsLloyd2003&amp;quot;&amp;gt;Adams, Carlisle, and Lloyd, Steve (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;AdamsLloyd2003&amp;quot;&amp;gt;Adams, Carlisle, and Lloyd, Steve (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780672323911&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-672-32391-1&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Anderson1972&amp;quot;&amp;gt;Anderson, James P. (1972)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Anderson1972&amp;quot;&amp;gt;Anderson, James P. (1972)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 6:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 6:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Anderson2001&amp;quot;&amp;gt;Anderson, Ross (2001)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Anderson2001&amp;quot;&amp;gt;Anderson, Ross (2001)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780471389224&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-471-38922-4&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Becker2003&amp;quot;&amp;gt;Biddle, Peter, ''et al.'' (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Becker2003&amp;quot;&amp;gt;Biddle, Peter, ''et al.'' (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9783540404651&lt;/del&gt;, pp. 344-365.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-3-540-40465-1&lt;/ins&gt;, pp. 344-365.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Bostrom2003&amp;quot;&amp;gt;Bostrom, Nick (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Bostrom2003&amp;quot;&amp;gt;Bostrom, Nick (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 24:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 24:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Harrison2003&amp;quot;&amp;gt;Harrison, Richard (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Harrison2003&amp;quot;&amp;gt;Harrison, Richard (2003)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780470856116&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-470-85611-6&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Harrison2004&amp;quot;&amp;gt;Harrison, Richard (2004)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Harrison2004&amp;quot;&amp;gt;Harrison, Richard (2004)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780470871089&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-470-87108-9&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Holmes2002&amp;quot;&amp;gt;Holmes, Phil (2002)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Holmes2002&amp;quot;&amp;gt;Holmes, Phil (2002)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 39:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 39:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;McGrawFelten1999&amp;quot;&amp;gt;McGraw, Gary, and Felten, Edward W. (1999)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;McGrawFelten1999&amp;quot;&amp;gt;McGraw, Gary, and Felten, Edward W. (1999)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780471319528&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-471-31952-8&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Miller2005&amp;quot;&amp;gt;Miller, Stanley A. (2005)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Miller2005&amp;quot;&amp;gt;Miller, Stanley A. (2005)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 48:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 48:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Sales2005&amp;quot;&amp;gt;Sales, Jane (2005)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Sales2005&amp;quot;&amp;gt;Sales, Jane (2005)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780470025246&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-470-02524-6&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;SaltzerSchroeder1975&amp;quot;&amp;gt;Saltzer, Jerome H., and Schroeder, Michael D. (1975)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;SaltzerSchroeder1975&amp;quot;&amp;gt;Saltzer, Jerome H., and Schroeder, Michael D. (1975)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 54:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 54:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Schneier1996&amp;quot;&amp;gt;Schneier, Bruce (1996)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;Schneier1996&amp;quot;&amp;gt;Schneier, Bruce (1996)&amp;lt;/span&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;9780471128458&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;:''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;978-0-471-12845-8&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff:version:1.11a:oldid:454:newid:456 --&gt;
&lt;/table&gt;</summary>
		<author><name>Craig</name></author>	</entry>

	<entry>
		<id>http://wiki.franklinheath.co.uk/index.php?title=Symbian_OS_Platform_Security/References&amp;diff=454&amp;oldid=prev</id>
		<title>Craig: Created page with ';&lt;span id=&quot;AdamsLloyd2003&quot;&gt;Adams, Carlisle, and Lloyd, Steve (2003)&lt;/span&gt; :''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment…'</title>
		<link rel="alternate" type="text/html" href="http://wiki.franklinheath.co.uk/index.php?title=Symbian_OS_Platform_Security/References&amp;diff=454&amp;oldid=prev"/>
				<updated>2011-01-20T16:01:39Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#039;;&amp;lt;span id=&amp;quot;AdamsLloyd2003&amp;quot;&amp;gt;Adams, Carlisle, and Lloyd, Steve (2003)&amp;lt;/span&amp;gt; :&amp;#039;&amp;#039;[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;;&amp;lt;span id=&amp;quot;AdamsLloyd2003&amp;quot;&amp;gt;Adams, Carlisle, and Lloyd, Steve (2003)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN 9780672323911.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Anderson1972&amp;quot;&amp;gt;Anderson, James P. (1972)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=ueKkSgAACAAJ Computer Security Technology Planning Study]'', ESDTR-73-51, US Air Force Electronic Systems Division, October.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Anderson2001&amp;quot;&amp;gt;Anderson, Ross (2001)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN 9780471389224.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Becker2003&amp;quot;&amp;gt;Biddle, Peter, ''et al.'' (2003)&amp;lt;/span&amp;gt;&lt;br /&gt;
:‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN 9783540404651, pp. 344-365.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Bostrom2003&amp;quot;&amp;gt;Bostrom, Nick (2003)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://www.simulation-argument.com/simulation.html ‘Are You Living in a Computer Simulation?’], ''Philosophical Quarterly'' 53:211, Blackwell, pp 243-255.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;ComputerIndustryAlmanac2005&amp;quot;&amp;gt;Computer Industry Almanac, Inc. (2005)&amp;lt;/span&amp;gt;&lt;br /&gt;
:Press Release, http://www.c-i-a.com/pr0305.htm, 9 March.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;DennisVanHorn&amp;quot;&amp;gt;Dennis, Jack B., and Van Horn, Earl C. (1966)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://portal.acm.org/citation.cfm?doid=365230.365252 ‘Programming Semantics for Multiprogrammed Computations’], in ''Communications of the ACM'' 9:3, March.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Gowdiak2004&amp;quot;&amp;gt;Gowdiak, Adam (2004)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://dl.packetstormsecurity.net/hitb04/hitb04-adam-gowdiak.pdf ''Java 2 Micro Edition Security Vulnerabilities''], presented at [http://conference.hackinthebox.org/hitbsecconf2004/#F34653 Hack-in-the-Box Security Conference], Kuala Lumpur, October.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Harrison2003&amp;quot;&amp;gt;Harrison, Richard (2003)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN 9780470856116.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Harrison2004&amp;quot;&amp;gt;Harrison, Richard (2004)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN 9780470871089.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Holmes2002&amp;quot;&amp;gt;Holmes, Phil (2002)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://www.opengroup.org/onlinepubs/007679899/ ''An Introduction to Boundaryless Information Flow''], electronic publication, The Open Group, July.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Juvenal100&amp;quot;&amp;gt;Juvenal, Decimus J. (c.100CE)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://en.wikipedia.org/wiki/Satire_VI ''Satire VI''].&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Kerckhoffs1883&amp;quot;&amp;gt;Kerckhoffs, Auguste (1883)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://www.petitcolas.net/fabien/kerckhoffs/ ‘La Cryptographie Militaire’], in ''Journal des Sciences Militaires'' IX, January/February.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;McGrawFelten1999&amp;quot;&amp;gt;McGraw, Gary, and Felten, Edward W. (1999)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN 9780471319528.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Miller2005&amp;quot;&amp;gt;Miller, Stanley A. (2005)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://www.usatoday.com/tech/products/gear/2005-04-04-cell-bad-splash_x.htm ''When nature calls, cell phone owners should answer carefully''], Associated Press, 4th April.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Odlyzko2001&amp;quot;&amp;gt;Odlyzko, Andrew M. (2001)&amp;lt;/span&amp;gt;&lt;br /&gt;
:‘Content is Not King’, in ''First Monday'' 6:2, http://www.firstmonday.org/issues/issue6_2, February.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Sales2005&amp;quot;&amp;gt;Sales, Jane (2005)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN 9780470025246.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;SaltzerSchroeder1975&amp;quot;&amp;gt;Saltzer, Jerome H., and Schroeder, Michael D. (1975)&amp;lt;/span&amp;gt;&lt;br /&gt;
:[http://web.mit.edu/Saltzer/www/publications/protection/index.html ‘The Protection of Information in Computer Systems’], in ''Proceedings of the IEEE'' 63:9, September, pp. 1278-1308.&lt;br /&gt;
&lt;br /&gt;
;&amp;lt;span id=&amp;quot;Schneier1996&amp;quot;&amp;gt;Schneier, Bruce (1996)&amp;lt;/span&amp;gt;&lt;br /&gt;
:''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN 9780471128458.&lt;/div&gt;</summary>
		<author><name>Craig</name></author>	</entry>

	</feed>