1. Byrne, B.: Voip hacking about to hurt small businesses? (June 3, 2011),
http://meship.com/Blog/2011/06/03/voip-hacking-about-to-hurt-businesses/
(retrieved)
2. DePasquale, S.: How to analyze security needs (May 1, 2004),
http://securitysolutions.com/mag/security_analyze_security_needs/index1.html
(retrieved)
3. Harris, S.: CISSP all-in-one exam guide, 5th edn. McGraw-Hill, New York (2010)
4. itsecurity.com. Create your own security audit (January 4, 2007),
http://www.itsecurity.com/features/it-security-audit-010407/
(retrieved)
5. MCS, Musil, S.: Business continuity planning: best practices for your organization (2007),
http://www.mcsmanagement.com/WhitepapersUpload
(retrieved)