GetTRDoc
HAKIN9 IT Security Magazine [April 2013 Issue]
Copyright © 2005 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Owasp LA
CAP6135: Malware and Software Vulnerability Analysis Buffer Overflow II: Defense Techniques Cliff Zou Spring 2015.
SEC302 Windows Server 2003 Security Enhancements Ben Smith Senior Security Strategist Microsoft Corporation.
Section 3.4: Buffer Overflow Attack: Defense Techniques 1.
Acknowledgement
CNT4704: Computer Networking Special Topic: Buffer Overflow II: Defense Techniques Cliff Zou Fall 2010.
SDL in an Agile World MSSD-3 третья по счету конференция, посвященная всестороннему обсуждению популярной и важной