1. The Missing Circle of ISMS (LL-ISMS)
2. Schwalbe K. (2015). Information technology project management. Cengage Learning. Schwalbe K. (2015). Information technology project management. Cengage Learning.
3. ISACA A. (2009). Introduction to the Business Model for Information Security. ISACA A. (2009). Introduction to the Business Model for Information Security.
4. Ristov S. Gusev M. & Kostoska M. (2012). Cloud computing security in business information systems. arXiv preprint arXiv:1204.1140. Ristov S. Gusev M. & Kostoska M. (2012). Cloud computing security in business information systems. arXiv preprint arXiv:1204.1140.