1. Akhgar, S., Yates, B. 2013. Strategic Intelligence Management, 1st Edition, Butterworth-Heinemann, 9780124071919, 56-255.
2. Axa Corporate Solutions official web-site, description available at http://www.axa-corporatesolutions.com (website visited on July 15, 2014).
3. Cenzic, 2014 Cenzic, Application Vulnerability Trends Report: 2014, description available at: www.cenzic.com (website visited on January 03, 2015).
4. CISCO, 2014. CISCO, 2014 Annual Security Report, description available at: www.cisco.com (website visited on January 04, 2015).
5. CISCO, 2013. CISCO, 2013 Annual Security Report, description available at: www.cisco.com (website visited on January 04, 2015).