|
Literatuurlijst
Ken Thompson, Reflections on Trusting Trust, reprinted from Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. Copyright 1984, Association for Computing Machinery, Inc. Also appears in ACM Turing Award Lectures: The First Twenty Years 1965-1985 Copyright 1987 by the ACM press and Computers Under Attack: Intruders, Worms, and Viruses Copyright 1990 by the ACM press.
David Keppel, Susan J. Eggers and Robert R. Henry, A Case for Runtime Code Generation, Technical Report 91-11-04, Department of Computer Science and Engineering, FR-35, University of Washington, Seattle, WE 98195 USA.
Don Pardo, Runtime Code Generation (RTCG), http://www.cs.washington.edu/homes/pardo/rtcg.d
40Hex Online, an online magazine, issue 1 volume1 0004, Simple encryption methods, http://www.xenos.net/pub/text/zines/all/40hex/, http://www.tezcat.com/~glitch/philes/G_philes/40HEX/ of http://www.etext.org/Publishers/40hex/
Corewars - King of the hill, http://www.koth.org/
HotJava(tm): The Security Story, http://java.sun.com/sfaq/may95/security.html
The Computer Museum of America (CMA) , http://www.computer-museum.org
|