1. http://www.rightscale.com/blog/cloud-management-best-practices/docker-vs-vms-combining-both-cloud-portability-nirvana
. Accessed 18 April 2016
2. http://osdelivers.blackducksoftware.com/2015/06/24/dockercon-2015-stacking-containers-of-excitement-and-announcements/
. Accessed 15 May 2016
3. https://insights.sei.cmu.edu/devops/2015/01/devops-and-docker.html
. Accessed 18 April 2016
4. https://blog.docker.com/2016/03/docker-for-mac-windows-beta/
. Accessed 21 June 2016
5. Bucerzan, D., Raţiu, C.: Contributions to Steganographic Techniques on Mobile Devices. In: Proceedings of the Security for Information Technology and Communications, LNCS, vol. 9522. Springer (2015)