1. Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network Security Journal, 2011(3), 12-16.
2. Amazon. (2010). Amazon web services: Overview of security processes. Retrieved from awsmedia.s3.amazonaws.com/pdf/AWS_Security_Whitepaper.pdf
3. Arthur, C. (2010). Google's ChromeOS means losing control of data, warns GNU founder Richard Stallman. Retrieved from http://www.guardian.co.uk/technology/blog/2010/dec/14/chrome-os-richard-stallman-warning
4. Bono, S. C., Green, M., Stubblefield, A., Juels, A., Rubin, A. D., & Szydlo, M. (2005). Security analysis of a cryptographically-enabled RFID device. In Proceedings of the 14th Conference on USENIX Security, Berkeley, CA.