Application Security Tom Chothia Computer Security, Lecture 14.
© The McGraw-Hill Companies, 2006 Chapter 1 The first step.