Hardening the Browser
DOI:
https://doi.org/10.5860/rusq.51n3.210References
Kate Murphy, '“New Hacking Tools Pose Bigger Threats to Wi-Fi Users,”' New York Times (Feb. 16, 2011): (accessed June 1, 2011).www.nytimes.com/2011/02/17/technology/personaltech/17basics.htmln Statistical Abstract of the United States: 2012 (Washington, D.C.: Government Printing Office 2011): 723- (accessed Oct. 10, 2011).n '“Pwn2Own,”' () (accessed May 25, 2011).nDan Tynan, '“The 25 Worst Tech Products of All Time,”' PC World (May 26, 2006): (accessed June 3, 2011).www.pcworld.com/article/125772–3/the_25_worst_tech_products_of_all_time.htmln '“The Internet Explorer 6 Countdown,”' () (accessed Oct. 10, 2011).nCharles Reis, Adam Barth, Carlos Pizano, '“Browser Security: Lessons from Google Chrome,”' Communications of the ACM 52 no. 8 (2009): 45-49 (accessed June 3, 2011).http://cacm.acm.org/magazines/2009/8/34494-browser-security/fulltextn