References
[1] "Win2K Processes," http://users.aber.ac.uk/anw1/processes.html.
[2] David A. Solomon and Mark E. Russinovich, Inside Microsoft Windows 2000, Third Edition, Microsoft Press, 2000.
[3] CERT Coordination Center, "Wuarchive Ftpd Trojan Horse," April 6, 1994, http://www.cert.org/advisories/CA-1994-07.html.
[4] CERT Coordination Center, "Trojan Horse Version of TCP Wrappers," January 21, 1999, http://www.cert.org/advisories/CA-1999-01.html. [5] Ken Thompson, "Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761763, http://www.acm.org/ classics/sep95/.
[6] Watts S. Humphrey, "Bugs or defects?" http://interactive.sei.cmu.edu/ news@sei/columns/watts_new/1999/March/watts-mar99.htm#humphrey.
[7] Kathryn Balint, "Software Firms Need to Plug Security Holes, Critics Contend," San Diego Union-Tribune, http://www.signonsandiego.com/ news/computing/personaltech/20020128-9999_mz1b28securi.html. [8] Eric Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley, 2003.