Desktop version

Home arrow Computer Science arrow Securing Systems Applied Security Architecture and Threat Models

References

  • 1. Oxford Dictionary of English. (2010). 3rd ed. UK: Oxford University Press.
  • 2. Buschmann, F., Henney, K., and Schmidt, D. C. (2007). “Foreword.” In Pattern-Oriented Software Architecture: On Patterns and Pattern Languages. Vol. 5. John Wiley & Sons.
  • 3. Rosenquist, M. (2009). “Prioritizing Information Security Risks with hreat Agent Risk Assessment.” IT@Intel White Paper, Intel Information Technology. Retrieved from http://media10.connectedsocialmedia.com/intel/10/5725/Intel_IT_Business_Value_ Prioritizing_Info_Security_Risks_with_TARA.pdf.
  • 4. Schoenfield, B. (2014). “Applying the SDL Framework to the Real World” (Ch. 9). In Core Software Security: Security at the Source, pp. 255—324. Boca Raton (FL): CRC Press.
  • 5. Harris, K. D. (2014). “Cybersecurity in the Golden State.” California Department of Justice.
  • 6. Alperovitch, D. (2011-08-02). “Revealed: Operation Shady RAT.” McAfee, Inc. White Paper.
  • 7. Ibid.
  • 8. Global hreat Report 2013 YEAR IN REVIEW, Crowdstrike, 2013. Available at: http://www.crowdstrike.com/blog/2013-year-review-actors-attacks-and-trends/index. html.
  • 9. Bright, P., Anderson, N., and Cheng, J. (2011). Unmasked. Amazon Kindle. Retrieved from http://www.amazon.com/Unmasked-Peter-Bright.
  • 10. Reitman, J. (Dec. 7, 2012). “he Rise and Fall of Jeremy Hammond: Enemy of the State.” Rolling Stone Magazine. Retrieved from http://www.rollingstone.com/culture/news/ the-rise-and-fall-of-jeremy-hammond-enemy-of-the-state-20121207.
  • 11. Sherwood, J., Clark, A., and Lynas, D. “Enterprise Security Architecture.” SABSA White Paper, SABSA Limited, 1995—2009. Retrieved from http://www.sabsa-institute.com/ members/sites/default/inline-fi les/SABSA_White_Paper.pdf.
  • 12. Arkin, B. (2012). “NeverWaste a Crisis - Necessity Drives Software Security.” RSAConference 2012, San Francisco, CA, February 29, 2012. Retrieved from http://www.rsaconference. com/events/us12/agenda/sessions/794/never-waste-a-crisis-necessity-drives-software.
  • 13. Fey, M., Kenyon, B., Reardon, K. T., Rogers, B., and Ross, C. (2012). “Assessing Mission Readiness” (Ch. 2). In Security Battleground: An Executive Field Manual. Intel Press.
 
Source
< Prev   CONTENTS   Source   Next >