1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., … Stoica, I. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.
2. Ashwin. (2015, 24 Haziran). Why The Keys In The Keyboard Are Not Arranged In Alphabetical Order? Science ABC. https://www.scienceabc.com/innovation/qwerty-keyboard-over-the-years-why-is-it-the-most- preferred-typing-tool.html adresinden erişildi.
3. Atan, S. (2012). Google App Engine. KODLAB Yayın Dağıtım.
4. Barnes, W., Gartland, M. ve Stack, M. (2004). Old Habits Die Hard:Path Dependency and Behavioral Lock-in. Journal of Economic Issues, 38(2), 371–377. doi:10.1080/00213624.2004.11506696
5. Bisong, A. ve Rahman, M. (2011). An overview of the security concerns in enterprise cloud computing. arXiv preprint arXiv:1101.5613.