Proceedings of the 7th Australian Information Security Management Conference
Rietta, F. S. (2006). Application Layer Intrusion Detection for SQL Injection. Paper presented at the ACM SE. Retrieved October 21, 2009, from http://www.rietta.com/papers/rietta_acmse2006.pdf
RSA (2008). Mitigating Man-in-the-middle and Trojan Attacks: Best Practices for Combating Emerging Threats with Layered Security. Journal. Retrieved from www.rsa.com/products/securid/.../9528_MITM_WP_0708- lowres.pdf
Scambray, J., Shema, M., & Sima, C. (2006). Hacking Exposed Web Applications Second Edition. California: McGraw- Hill.
ScanSpyware. (2008). Nuklus.A. Retrieved October 21, 2009, from http://www.scanspyware.net/info/Nuklus.A.htm
SecurityMob. (2007). Infostealer.Nuklus. Retrieved October 21, 2009, from http://www.securitymob.com/my_smob/alert_info.asp?alert=55812
Ståhlberg, M. (2007). The Trojan Money Spinner. Paper presented at the Virus Bulletin Conference, Helsinki, Finland.
Trusteer. (n.d.). Man-in-the-Browser. Retrieved September 26, 2009, from http://www.trusteer.com/maninthebrowser
US-CERT. (2008). Banking Securely Online. Retrieved October 21, 2009. from http://www.us- cert.gov/reading_room/Banking_Securely_Online07102006.pdf.
Vugt, S. v. (2009). Ubuntu Netbooks: The Path to Low-cost Computing: Apress.
Nattakant Utakrit ©2009. The author/s assign the Security Research Centre (SECAU) & Edith Cowan University a non- exclusive license to use this document for personal use provided that the article is used in full and this copyright statement is reproduced. The authors also grant a non-exclusive license to SECAU & ECU to publish this document in full in the Conference Proceedings. Such documents may be published on the World Wide Web, CD-ROM, in printed form, and on mirror sites on the World Wide Web. Any other usage is prohibited without the express permission of the authors
119| P a g e