1. 2003. Artificial Intelligence: A Modern Approach. (2003). 2003. Artificial Intelligence: A Modern Approach. (2003).
2. 2018. System Auditing RedHat Enterprise Linux 6. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing. 2018. System Auditing RedHat Enterprise Linux 6. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing.
3. 2019. Public exploits. https://www.hackingloops.com/exploit/. 2019. Public exploits. https://www.hackingloops.com/exploit/.
4. 2019. Zynga data breach. https://us.norton.com/internetsecurity-emerging-threats-new-report-says-zynga-breach-in-september-affected-172-million-a.html. 2019. Zynga data breach. https://us.norton.com/internetsecurity-emerging-threats-new-report-says-zynga-breach-in-september-affected-172-million-a.html.
5. 2020. APT Notes. https://github.com/aptnotes/data. 2020. APT Notes. https://github.com/aptnotes/data.