References
- Kaiping Liu; Hee Beng Kuan Tan; Shar, L.K., Semi-Automated Verification of Defense against SQL Injection in Web Applications, Software Engineering Conference (APSEC), 2012 19th Asia-Pacific , vol.1, no., pp.91,96, 4-7 Dec. 2012.
- JOHNNY LONG, Google Hacking for Penetration Testers Vol., No., pp. 41-62, 2010.
- Beaver Kevin, Hacking for Dummies 4th Edition, V ol., No., pp. 281-282, 2012.
- Seungju Jang, Juneho Kim, Design of files and direc tories with security features within the Windows O. S. using Visual C++, Vol. 7, No. 1, pp 510-514, 2009
- Acevedo, B.; Bahler, L.; Elnozahy, E.N.; Ratan, V.; Segal, M. E., Highly available directory services in DCE, Fault Tolerant Computing, Proceedings of Annual Symposium on, vol., no., pp.387,391, 25-27 Jun 1996
- DOI: http://dx.doi.org/10.1109/HPCA.1999.744354
- DOI: http://dx.doi.org/10.1109/IEEESTD.1994.122164
- Jae-Nam Woo, Red Hat Fedora Linux Server & Network, Vol., No., pp. 573-575, 2010.
- S. B. Hong, Linux Server Security Management Practices 2nd Edition, Vol, 1. No., pp.85-86, 2008.
- KISA, Web Server Security Check's Guide, pp. 64-65, 2010
- B. Moore, E. Elleson, J. Strassner, A. Westerinen, "Policy Core Information Model", Request for Comments RFC 3060, February 2001.
- J.Halpern, S.Convery, R. Saville, "IPSec Virtual Private Networks in Depth VPN", Cisco Systems White Paper, June 2001.
- DOI: http://dx.doi.org/10.1109/TPDS.2005.4