1. GOST (State Standard) R ISO/MEK 15408-1-2012: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 1. Introduction and the General Model, 2014.
2. GOST (State Standard) R ISO/MEK 15408-2-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 2. Functional Safety Requirements, 2014.
3. GOST (State Standard) R ISO/MEK 15408-3-2013: Information Technology. Methods and Means of Ensuring Security. Criteria for Assessing the Security of Information Technology. Part 3. Components of Confidence in Security, 2014.
4. Buecker, A., Carreno, A.V., Field, N., Hockings, C., Kawer, D., Mohanty, S., and Monteiro, S., Enterprise Security Architecture Using IBM Tivoli Security Solutions, IBM: Redbook, 2007.
5. Ramachandran, J., Designing Security Architecture Solutions, J. Willey, Inc., 2002.