1. Skoudis, E., Zeltser, L.: MALWARE – Fighting Malicious Code. Prentice Hall, Englewood Cliffs (2004)
2. MIWA, S., OHNO, H.: A Development of Experimental Environments ”SIOS” and ”VM Nebula” for Reproducing Internet Security Incidents. Journal of the National Institute of Information and Communications Technology 52(1/2), 23–34 (2005)
3. Eilam, E.: Reversing: Secrets of Reverse Engineering. Wiley Publishing, Chichester (2005)
4. The Honeynet Project, Know Your Enemy — Revealing the Security Tools, Tactics and Motives of the Blackhat Community. Addison Wesley, Reading (2002)(ISBN 0-201-74613-1, Pearson Education Corp.)
5. Smith, J.E., Nair, R.: Virtual Machines — Versatile Platforms for Systems and Processes. Morgan Kaufmann, San Francisco (2005)