-
1
-
2
-
3
-
4
Hacking exposed J2EE and Java developing secure applications with Java technology
Gepubliceerd in 2002Boek -
5
-
6
A survey of customizability in operating systems research.
Gepubliceerd in ACM computing surveys.Artikel -
7
A secure multicast protocol with copyright protection.
Gepubliceerd in Computer communication review.Artikel -
8
-
9
-
10
Stack and queue integrity on hostile platforms.
Gepubliceerd in IEEE Transactions on software engineeringArtikel