1. Amazon. Amazon Elastic Compute Cloud (EC2), 2010 〈http://www.amazon.com/ec2/〉 [accessed: 10 December 2009].
2. Attanasio CR. Virtual machines and data security. In: Proceedings of the workshop on virtual computer systems. New York, NY, USA: ACM; 1973. p. 206–9.
3. Auger R. SQL Injection, 2009 〈http://projects.webappsec.org/SQL-Injection〉 [accessed on: 15 February 2010].
4. Computer security and penetration testing;Basta;Delmar Cengage Learning,2007
5. Bernard Golden. Defining private clouds, 2009 〈http://www.cio.com/article/ 492695/Defining_Private_Clouds_Part_One〉 [accessed on: 11 January 2010].