1. Abramov, J. (n.d.). Security issues in NoSQL Databases. Retrieved from http://jkb.netii.net/index.php/pub/sinosqldb/introduction
2. All Answers Ltd. (2014). Files used in the mongo db computer science essay. UK Essays. Retrieved from http://www.ukessays.com/essays/computer-science/files-used-in-the-mongo-db-computer-science-essay.php
3. Alonso, C., Fernandez, M., Martín, A., & Guzmán, A. (2010). In N. Garbolino (Ed.), Connection string parameter pollution attacks. Arlington, VA: Black hat dc 2010.
4. Amazon Web Services. (2013, November). Amazon Web Services: Overview of Security Processes. Retrieved from http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf
5. Apache Software Foundation. (2013). Apache accumulo. Retrieved from https://accumulo.apache.org/