Symbian OS Platform Security/References

From Franklin Heath Ltd Wiki
Revision as of 16:01, 20 January 2011 by Craig (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Adams, Carlisle, and Lloyd, Steve (2003)
Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edition, Addison-Wesley, ISBN 9780672323911.
Anderson, James P. (1972)
Computer Security Technology Planning Study, ESDTR-73-51, US Air Force Electronic Systems Division, October.
Anderson, Ross (2001)
Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, ISBN 9780471389224.
Biddle, Peter, et al. (2003)
‘The Darknet and the Future of Content Protection’, in Digital Rights Management: Technological, Economic, Legal and Political Aspects, Springer-Verlag, ISBN 9783540404651, pp. 344-365.
Bostrom, Nick (2003)
‘Are You Living in a Computer Simulation?’, Philosophical Quarterly 53:211, Blackwell, pp 243-255.</span>
Computer Industry Almanac, Inc. (2005)
Press Release, http://www.c-i-a.com/pr0305.htm, 9 March.
Dennis, Jack B., and Van Horn, Earl C. (1966)
‘Programming Semantics for Multiprogrammed Computations’, in Communications of the ACM 9:3, March.
Gowdiak, Adam (2004)
Java 2 Micro Edition Security Vulnerabilities, presented at Hack-in-the-Box Security Conference, Kuala Lumpur, October.
Harrison, Richard (2003)
Symbian OS C++ for Mobile Phones, Wiley, ISBN 9780470856116.
Harrison, Richard (2004)
Symbian OS C++ for Mobile Phones, Volume 2, Wiley, ISBN 9780470871089.
Holmes, Phil (2002)
An Introduction to Boundaryless Information Flow, electronic publication, The Open Group, July.
Juvenal, Decimus J. (c.100CE)
Satire VI.
Kerckhoffs, Auguste (1883)
‘La Cryptographie Militaire’, in Journal des Sciences Militaires IX, January/February.
McGraw, Gary, and Felten, Edward W. (1999)
Securing Java, Wiley, ISBN 9780471319528.
Miller, Stanley A. (2005)
When nature calls, cell phone owners should answer carefully, Associated Press, 4th April.
Odlyzko, Andrew M. (2001)
‘Content is Not King’, in First Monday 6:2, http://www.firstmonday.org/issues/issue6_2, February.
Sales, Jane (2005)
Symbian OS Internals: Real Time Kernel Programming, Wiley, ISBN 9780470025246.
Saltzer, Jerome H., and Schroeder, Michael D. (1975)
‘The Protection of Information in Computer Systems’, in Proceedings of the IEEE 63:9, September, pp. 1278-1308.
Schneier, Bruce (1996)
Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, Wiley, ISBN 9780471128458.