X hits on this document

385 views

0 shares

0 downloads

0 comments

120 / 120

[44] IBM. (2007). Enterprise COBOL for z/OS: Language Reference V4R1. (1st ed.) [Online]. Available: http://publibfp.boulder.ibm.com/epubs/pdf/igy3lr40.pdf

[45] Symantec Corp. (2009 Apr). Symantec Global Internet Security Threat Report (1st ed.) [Online]. Volume 14(1). Available: http://eval.symantec.com/mktginfo/enterprise/white_papers/b- whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf

[46]

Microsoft TechNet. (2009, May 7).

indows Sysinternals: utilities to help manage,

troubleshoot and diagnose

indows systems and applications. [Online].

Available: http://technet.microsoft.com/en-us/sysinternals/default.aspx

[47] ThreatExpert Ltd. (2009) ThreatExpert: ThreatExpert is an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security related risks in a fully automated mode. [Online]. Available: http://www.threatexpert.com

[48] M. El-Ramly, “Experience in teaching a software reengineering course,” in Proc. 28th Int. Conf. on Software Engineering. Shanghai, China, 2006, pp. 699-702.

112

Document info
Document views385
Page views386
Page last viewedSat Dec 10 09:35:23 UTC 2016
Pages120
Paragraphs2913
Words25794

Comments