1. Anderson, R.: Why Information Security is Hard. In: Proc. of the 17th Annual Computer Security Applications Conference (2001)
2. CWE.: 2011 CWE/SANS Top 25 Most Dangerous Software Errors,
http://cwe.mitre.org/top25/
(accessed, May 2014)
3. Council on Cybersecurity: The critical security controls for effective cyber defense (version 5.0),
http://www.counciloncybersecurity.org/attachments/article/12/CSC-MASTER-VER50-2-27-2014.pdf
(accessed, May 2014)
4. 2012 Deloitte-NASCIO Cybersecurity Study State governments at risk: A call for collaboration and compliance,
https://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/AERS/us_aers_nascio%20Cybersecurity%20Study_10192012.pdf
(accessed, May 2014)
5. Alpcan, T., Basar, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)