1. Aczel, P. (2008). Variants of Classical Set Theory and their Applications. Retrieved from http://www.cs.man.ac.uk/~petera/
2. A Unified Approach to Information Security Compliance.;M. P.Adler;EDUCAUSE Review,2006
3. FIPS. (2006). Minimum Security Requirements for Federal Information and Information Systems. Retrieved from http://csrc.nist.gov/
4. Garmendia, L. (2007). The Evolution of the Concept of Fuzzy Measure. Retrieved from http://www.fdi.ucm.es/profesor/lgarmend/SC/Congresos/
5. Goldrei, D. C. (1996). Classic Set Theory: For Guided Independent Study. London: Chapman & Hall.