1. Zemskov, A.I. and Shraiberg, Ya.L., Elektronnaya informatsiya i elektronnye resursy: publikatsii i dokumenty, fondy i biblioteki (Electron Information and Electron Resources: Publications and Documents, Funds and Libraries), Moscow: FAIR, 2007.
2. Sukhanov, A., History of one spam or as to survive in “Web”? Mir Person. Komp., 2000, no. 8, pp. 88–93.
3. Levin, M.E., E-mail “bezopasnaya”: Vzlom, “spam” i “khakerskie” ataki na sistemy elektronnoi pochty Internet (“Safe” e-mail: Hacking, “spam” and “Hacker” attacks on electron mail systems in Internet), Moscow: Maior, 2002.
4. Tsvetkov, V.Ya. and Bulgakov, S.V., Information threat - spam, Izv. Vyssh. Uchebn. Zaved. (Vuzov). Geodeziya Aerofotos”emka, 2004, no. 5, p. 118–130.
5. Rudik, K.P., Reveal of network cross-points distributed harmful programs and spam in electron mail systems, Bezopasnost’ Inform. Tekhnol., 2008, no. 1, pp. 35–45.