1. http://www.crime-research.org/analytics/501
2. Lam, F., Beekey, M., and Cayo, K.: Can you hack it? Security Management, vol. 47 no. 2, pp. 83–88, Feb 2003.
3. Klevinsky, T.J., Laliberte S., Gupta A.: Hack I.T., Addison — Wesley, December 2004.
4. Geer, D., Harthorne, J.: Penetration Testing: A Duet. Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC’02), pp 185–198.
5. Budiarto, R., Ramadass, S., Samsudin, A., Noor, S.: Development of Penetration Testing Model for Increasing Network Security, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 19–23 April 2004, IEEE pp 563–4.