10 Questions on eCommerce (CNET), http://builder.cnet.com/Business/Ecommerce20/.
A Beginner's Guide to B2B Electronic Commerce, http://ecommerce.about.com/smallbusiness/ecommerce/library/weekly/aa021600a.htm.
Aho, Alfred, Monica Lam, Ravi Sethi, and Jeffrey Ullman. Compilers: Principles, Techniques, and Tools, 2nd Edition. New York: Addison-Wesley, 2006.
Anderson, Ross. Security Engineering, 2nd Edition. Hoboken: John Wiley & Sons, 2008.
Armbrust, Michael and Armando Fox. “Above the Clouds: A Berkeley View of Cloud Computing,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2009-28, February 10, 2009, www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.
Balding, Craig. “ITG2008 World Cloud Computing Summit,” 2008, http://cloudsecurity.org.
BEinGRID Project. Gridipedia: GridDic, “The Grid Computing Glossary, 2009,” www.gridipedia.eu/grid-computing-glossary.html.
Brodkin, Jon. “Seven Cloud-Computing Security Risks,” 2008, www.networkworld.com/news/2008/070208-cloud.html.
Burnett, Steve. RSA Security's Official Guide to Cryptography. New York: McGraw-Hill, 2004.
Burns, Bryan, Dave Killion, Nicolas Beauchesne, Eric Moret, et al. Security Power Tools. Sebastopol: O'Reilly Media, 2007.
Burton Group. “Attacking and Defending Virtual Environments,” www.burtongroup.com/Guest/Srms/AttackingDefendingVirtual.aspx.
Cavoukian, Ann. “Privacy in the Clouds — A White Paper on Privacy and Digital Identity: ...