Difference between revisions of "Symbian OS Platform Security/References"
From Franklin Heath Ltd Wiki
(Created page with ';<span id="AdamsLloyd2003">Adams, Carlisle, and Lloyd, Steve (2003)</span> :''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment…') |
m (ISBN formatting) |
||
Line 1: | Line 1: | ||
;<span id="AdamsLloyd2003">Adams, Carlisle, and Lloyd, Steve (2003)</span> | ;<span id="AdamsLloyd2003">Adams, Carlisle, and Lloyd, Steve (2003)</span> | ||
− | :''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN | + | :''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN 978-0-672-32391-1. |
;<span id="Anderson1972">Anderson, James P. (1972)</span> | ;<span id="Anderson1972">Anderson, James P. (1972)</span> | ||
Line 6: | Line 6: | ||
;<span id="Anderson2001">Anderson, Ross (2001)</span> | ;<span id="Anderson2001">Anderson, Ross (2001)</span> | ||
− | :''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN | + | :''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN 978-0-471-38922-4. |
;<span id="Becker2003">Biddle, Peter, ''et al.'' (2003)</span> | ;<span id="Becker2003">Biddle, Peter, ''et al.'' (2003)</span> | ||
− | :‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN | + | :‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN 978-3-540-40465-1, pp. 344-365. |
;<span id="Bostrom2003">Bostrom, Nick (2003)</span> | ;<span id="Bostrom2003">Bostrom, Nick (2003)</span> | ||
Line 24: | Line 24: | ||
;<span id="Harrison2003">Harrison, Richard (2003)</span> | ;<span id="Harrison2003">Harrison, Richard (2003)</span> | ||
− | :''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN | + | :''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN 978-0-470-85611-6. |
;<span id="Harrison2004">Harrison, Richard (2004)</span> | ;<span id="Harrison2004">Harrison, Richard (2004)</span> | ||
− | :''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN | + | :''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN 978-0-470-87108-9. |
;<span id="Holmes2002">Holmes, Phil (2002)</span> | ;<span id="Holmes2002">Holmes, Phil (2002)</span> | ||
Line 39: | Line 39: | ||
;<span id="McGrawFelten1999">McGraw, Gary, and Felten, Edward W. (1999)</span> | ;<span id="McGrawFelten1999">McGraw, Gary, and Felten, Edward W. (1999)</span> | ||
− | :''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN | + | :''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN 978-0-471-31952-8. |
;<span id="Miller2005">Miller, Stanley A. (2005)</span> | ;<span id="Miller2005">Miller, Stanley A. (2005)</span> | ||
Line 48: | Line 48: | ||
;<span id="Sales2005">Sales, Jane (2005)</span> | ;<span id="Sales2005">Sales, Jane (2005)</span> | ||
− | :''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN | + | :''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN 978-0-470-02524-6. |
;<span id="SaltzerSchroeder1975">Saltzer, Jerome H., and Schroeder, Michael D. (1975)</span> | ;<span id="SaltzerSchroeder1975">Saltzer, Jerome H., and Schroeder, Michael D. (1975)</span> | ||
Line 54: | Line 54: | ||
;<span id="Schneier1996">Schneier, Bruce (1996)</span> | ;<span id="Schneier1996">Schneier, Bruce (1996)</span> | ||
− | :''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN | + | :''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN 978-0-471-12845-8. |
Latest revision as of 17:00, 20 January 2011
- Adams, Carlisle, and Lloyd, Steve (2003)
- Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edition, Addison-Wesley, ISBN 978-0-672-32391-1.
- Anderson, James P. (1972)
- Computer Security Technology Planning Study, ESDTR-73-51, US Air Force Electronic Systems Division, October.
- Anderson, Ross (2001)
- Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, ISBN 978-0-471-38922-4.
- Biddle, Peter, et al. (2003)
- ‘The Darknet and the Future of Content Protection’, in Digital Rights Management: Technological, Economic, Legal and Political Aspects, Springer-Verlag, ISBN 978-3-540-40465-1, pp. 344-365.
- Bostrom, Nick (2003)
- ‘Are You Living in a Computer Simulation?’, Philosophical Quarterly 53:211, Blackwell, pp 243-255.</span>
- Computer Industry Almanac, Inc. (2005)
- Press Release, http://www.c-i-a.com/pr0305.htm, 9 March.
- Dennis, Jack B., and Van Horn, Earl C. (1966)
- ‘Programming Semantics for Multiprogrammed Computations’, in Communications of the ACM 9:3, March.
- Gowdiak, Adam (2004)
- Java 2 Micro Edition Security Vulnerabilities, presented at Hack-in-the-Box Security Conference, Kuala Lumpur, October.
- Harrison, Richard (2003)
- Symbian OS C++ for Mobile Phones, Wiley, ISBN 978-0-470-85611-6.
- Harrison, Richard (2004)
- Symbian OS C++ for Mobile Phones, Volume 2, Wiley, ISBN 978-0-470-87108-9.
- Holmes, Phil (2002)
- An Introduction to Boundaryless Information Flow, electronic publication, The Open Group, July.
- Juvenal, Decimus J. (c.100CE)
- Satire VI.
- Kerckhoffs, Auguste (1883)
- ‘La Cryptographie Militaire’, in Journal des Sciences Militaires IX, January/February.
- McGraw, Gary, and Felten, Edward W. (1999)
- Securing Java, Wiley, ISBN 978-0-471-31952-8.
- Miller, Stanley A. (2005)
- When nature calls, cell phone owners should answer carefully, Associated Press, 4th April.
- Odlyzko, Andrew M. (2001)
- ‘Content is Not King’, in First Monday 6:2, http://www.firstmonday.org/issues/issue6_2, February.
- Sales, Jane (2005)
- Symbian OS Internals: Real Time Kernel Programming, Wiley, ISBN 978-0-470-02524-6.
- Saltzer, Jerome H., and Schroeder, Michael D. (1975)
- ‘The Protection of Information in Computer Systems’, in Proceedings of the IEEE 63:9, September, pp. 1278-1308.
- Schneier, Bruce (1996)
- Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, Wiley, ISBN 978-0-471-12845-8.