Notes
- Viega , J. and McGraw , G. 2001 . Building Secure Software , Addison-Wesley Professional Computing Series .
- Schneier , Bruce . April 12, 1999 . Flaws in Cryptographic Systems ,
- Brooks Jr. 1995 . Frederic, The Mythical Man-Month: Essays On Software Engineering, , 2nd ed. , Reading, MA : Addison-Wesley .
- Thompson , K. L. 1984 . Reflections on trusting trust . Commun. ACM , 27 ( 8 ) August : 761 – 763 .
- ITU-T Recommendation X.509 specification.
- Browne , H. , Arbaugh , W. A. , McHugh , J. and Fithen , W. L. May 2001 . “ A Trend Analysis of Exploitations ” . In Proceedings of the 2001 IEEE Symposium on Security and Privacy May , 214 – 229 .