Thursday 25 October 2012

Anley C., “Advanced SQL injection in SQL
server applications,” A NGSSoftware Insight Security
Research (NISR) Publication. http://
www.nextgenss.com/papers/advanced_sql_
injection.pdf, 2002 (last visited: October 26,
2005).
Anzinger G., List over governments on the
WWW, http://www.gksoft.com/govt/en/,
last visisted: October 26, 2005.
Berners-Lee T., Masinter L., and McCahill M.,
RFC 1738 - Uniform Resource Locators (URL),
http://www.faqs.org/rfcs/rfc1738.html,
1994 (last visited: October 26, 2005).
CERT, “Cert Advisory CA-2000-02 Malicious
HTML tags embedded in client web requests,
” http://www.cert.org/advisories/
CA-2000-02.html, 2002 (last visited: October
26, 2005).
European Commission, “eGovernment services
yield real ben ts for EU citizens and
businesses,” http://europa.eu.int/rapid/
pressReleasesAction.do?reference=IP/
05/41&format=HTML&aged=0&language=
EN&guiLanguage=en, last visited: October 26,
2005.
Google, Directory over countries, http:
//directory.google.com/Top/Regional/
Countries/, last visited: October 26, 2005.
Hoglund G. and McGraw G., Exploiting Software:
How to Break Code, Addison-Wesley,
2004.
Hole K. J., Moen V., and Tjøstheim T., “Security
in Norwegian internet banks,” IEEE, Security
& Privacy, accepted for publication.
Hoofnagle C. J. and Mierzwinski E., “U.S. PIRG
Answers to Chairman Shaw's questions on Social
Security Number privacy”, http://www.epic.
org/privacy/ssn/ssnanswers7.2.04.html,
2004 (last visited: October 26, 2005).
Huang Y.-W., Yu F., Hang C., Tsai C.-H., Lee
D.-T., and Kuo S.-Y., “Securing web application
code by static analysis and runtime protection,”
in Proceedings of the 13th conference on World
Wide Web, New York, NY, USA, May 2004, pp.
40–52.
Huseby S. H., Innocent Code: a security wake-up
call for Web programmers,Wiley, 2004.
ISO, ISO 3166 country code lists, http:
//www.iso.org/iso/en/prods-services/
iso3166ma/02iso-3166-code-lists/index.
html, last visited: October 26, 2005.
Modsecurity, Open source web application rewall,
http://www.modsecurity.org/, last visited:
October 26, 2005.
Nationsonline.org, First, second and third world,
http://www.nationsonline.org/oneworld/
third_world_countries.htm, last visited: October
26, 2005.
Selmer E., “Personnummerering i Norge: Litt
anvendt tallteori og psykologi,” Nordisk matematisk
tidskrift, 1964.
The Digital Task Force, “The Danish eGovernment
Strategy 2004-2006,” http://e.gov.dk/
uploads/media/strategy_pixi.pdf, last visited:
October 26, 2005.

No comments:

Post a Comment