1. 2013 Data Breach Investigations Report. Verizon,
http://www.verizonenterprise.com/DBIR/2013/
2. Fortinet 2013 Cybercrime Report. Fortinet,
http://www.fortinet.com/resource_center/whitepapers/cybercrime_report_on_botnets_network_security_strategies.html
3. 2013 Information Security Breaches Survey,
https://www.gov.uk/government/publications/information-security-breaches-survey-2013-technical-report
4. The Demise in Effectiveness of Signature and Heuristic Based Antivirus,
http://docs.media.bitpipe.com/io_10x/io_102267/item_632588/2013-01-09_the_demise_of_signature_based_antivirus_final.pdf
5. Defeating Advanced Persistent Threat Malware. Infoblox,
http://securematics.com/sites/default/files/secure/default/files/pdfs/infoblox-whitepaper-defeating-apt-malware.pdf