Difference between revisions of "Symbian OS Platform Security/References"

From Franklin Heath Ltd Wiki
Jump to: navigation, search
(Created page with ';<span id="AdamsLloyd2003">Adams, Carlisle, and Lloyd, Steve (2003)</span> :''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment…')
 
m (ISBN formatting)
 
Line 1: Line 1:
 
;<span id="AdamsLloyd2003">Adams, Carlisle, and Lloyd, Steve (2003)</span>
 
;<span id="AdamsLloyd2003">Adams, Carlisle, and Lloyd, Steve (2003)</span>
:''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN 9780672323911.
+
:''[http://books.google.com/books?id=ERSfUmmthMYC Understanding PKI: Concepts, Standards and Deployment Considerations]'', 2nd edition, Addison-Wesley, ISBN 978-0-672-32391-1.
  
 
;<span id="Anderson1972">Anderson, James P. (1972)</span>
 
;<span id="Anderson1972">Anderson, James P. (1972)</span>
Line 6: Line 6:
  
 
;<span id="Anderson2001">Anderson, Ross (2001)</span>
 
;<span id="Anderson2001">Anderson, Ross (2001)</span>
:''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN 9780471389224.
+
:''[http://books.google.com/books?id=nd9QAAAAMAAJ Security Engineering: A Guide to Building Dependable Distributed Systems]'', Wiley, ISBN 978-0-471-38922-4.
  
 
;<span id="Becker2003">Biddle, Peter, ''et al.'' (2003)</span>
 
;<span id="Becker2003">Biddle, Peter, ''et al.'' (2003)</span>
:‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN 9783540404651, pp. 344-365.
+
:‘The Darknet and the Future of Content Protection’, in ''[http://books.google.com/books?id=y__ea3Vj_IMC Digital Rights Management: Technological, Economic, Legal and Political Aspects]'', Springer-Verlag, ISBN 978-3-540-40465-1, pp. 344-365.
  
 
;<span id="Bostrom2003">Bostrom, Nick (2003)</span>
 
;<span id="Bostrom2003">Bostrom, Nick (2003)</span>
Line 24: Line 24:
  
 
;<span id="Harrison2003">Harrison, Richard (2003)</span>
 
;<span id="Harrison2003">Harrison, Richard (2003)</span>
:''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN 9780470856116.
+
:''[http://books.google.com/books?id=zg9TAAAAMAAJ Symbian OS C++ for Mobile Phones]'', Wiley, ISBN 978-0-470-85611-6.
  
 
;<span id="Harrison2004">Harrison, Richard (2004)</span>
 
;<span id="Harrison2004">Harrison, Richard (2004)</span>
:''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN 9780470871089.
+
:''[http://books.google.com/books?id=Yh8Yosl04doC Symbian OS C++ for Mobile Phones, Volume 2]'', Wiley, ISBN 978-0-470-87108-9.
  
 
;<span id="Holmes2002">Holmes, Phil (2002)</span>
 
;<span id="Holmes2002">Holmes, Phil (2002)</span>
Line 39: Line 39:
  
 
;<span id="McGrawFelten1999">McGraw, Gary, and Felten, Edward W. (1999)</span>
 
;<span id="McGrawFelten1999">McGraw, Gary, and Felten, Edward W. (1999)</span>
:''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN 9780471319528.
+
:''[http://books.google.com/books?id=xY1jQgAACAAJ Securing Java]'', Wiley, ISBN 978-0-471-31952-8.
  
 
;<span id="Miller2005">Miller, Stanley A. (2005)</span>
 
;<span id="Miller2005">Miller, Stanley A. (2005)</span>
Line 48: Line 48:
  
 
;<span id="Sales2005">Sales, Jane (2005)</span>
 
;<span id="Sales2005">Sales, Jane (2005)</span>
:''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN 9780470025246.
+
:''[http://books.google.com/books?id=eKMeAQAAIAAJ Symbian OS Internals: Real Time Kernel Programming]'', Wiley, ISBN 978-0-470-02524-6.
  
 
;<span id="SaltzerSchroeder1975">Saltzer, Jerome H., and Schroeder, Michael D. (1975)</span>
 
;<span id="SaltzerSchroeder1975">Saltzer, Jerome H., and Schroeder, Michael D. (1975)</span>
Line 54: Line 54:
  
 
;<span id="Schneier1996">Schneier, Bruce (1996)</span>
 
;<span id="Schneier1996">Schneier, Bruce (1996)</span>
:''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN 9780471128458.
+
:''[http://books.google.com/books?id=6NdQAAAAMAAJ Applied Cryptography: Protocols, Algorithms and Source Code in C]'', 2nd edition, Wiley, ISBN 978-0-471-12845-8.

Latest revision as of 17:00, 20 January 2011

Adams, Carlisle, and Lloyd, Steve (2003)
Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edition, Addison-Wesley, ISBN 978-0-672-32391-1.
Anderson, James P. (1972)
Computer Security Technology Planning Study, ESDTR-73-51, US Air Force Electronic Systems Division, October.
Anderson, Ross (2001)
Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, ISBN 978-0-471-38922-4.
Biddle, Peter, et al. (2003)
‘The Darknet and the Future of Content Protection’, in Digital Rights Management: Technological, Economic, Legal and Political Aspects, Springer-Verlag, ISBN 978-3-540-40465-1, pp. 344-365.
Bostrom, Nick (2003)
‘Are You Living in a Computer Simulation?’, Philosophical Quarterly 53:211, Blackwell, pp 243-255.</span>
Computer Industry Almanac, Inc. (2005)
Press Release, http://www.c-i-a.com/pr0305.htm, 9 March.
Dennis, Jack B., and Van Horn, Earl C. (1966)
‘Programming Semantics for Multiprogrammed Computations’, in Communications of the ACM 9:3, March.
Gowdiak, Adam (2004)
Java 2 Micro Edition Security Vulnerabilities, presented at Hack-in-the-Box Security Conference, Kuala Lumpur, October.
Harrison, Richard (2003)
Symbian OS C++ for Mobile Phones, Wiley, ISBN 978-0-470-85611-6.
Harrison, Richard (2004)
Symbian OS C++ for Mobile Phones, Volume 2, Wiley, ISBN 978-0-470-87108-9.
Holmes, Phil (2002)
An Introduction to Boundaryless Information Flow, electronic publication, The Open Group, July.
Juvenal, Decimus J. (c.100CE)
Satire VI.
Kerckhoffs, Auguste (1883)
‘La Cryptographie Militaire’, in Journal des Sciences Militaires IX, January/February.
McGraw, Gary, and Felten, Edward W. (1999)
Securing Java, Wiley, ISBN 978-0-471-31952-8.
Miller, Stanley A. (2005)
When nature calls, cell phone owners should answer carefully, Associated Press, 4th April.
Odlyzko, Andrew M. (2001)
‘Content is Not King’, in First Monday 6:2, http://www.firstmonday.org/issues/issue6_2, February.
Sales, Jane (2005)
Symbian OS Internals: Real Time Kernel Programming, Wiley, ISBN 978-0-470-02524-6.
Saltzer, Jerome H., and Schroeder, Michael D. (1975)
‘The Protection of Information in Computer Systems’, in Proceedings of the IEEE 63:9, September, pp. 1278-1308.
Schneier, Bruce (1996)
Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, Wiley, ISBN 978-0-471-12845-8.