1. U.S. Department of Homeland Security, The MITRE Corporation: Common vulnerabilities and exposures—the standard for information security vulnerability names. CVE—Common Vulnerabilities and Exposures. The MITRE Corporation: McLean VA, 2005; 5 pp. Available at: http://www.cve.mitre.org [10 March 2005].
2. CERT Coordination Center. CERT advisories. CERT/CC Advisories. CERT Coordination Center, Carnegie Mellon University, Software Engineering Institute, Pittsburgh PA, 2004; 59 pp. Available at: http://www.cert.org/advisories/ [10 March 2005].
3. . Writing Secure Code. Microsoft Press: Redmond WA, 2003; 31-33, 23-49, 127-170.
4. Information systems security design methods
5. , . Developing Secure Software—a survey and classification of common software vulnerabilities. Fourth International IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems Conference Proceedings (IICIS 2001). Kluwer Academic: Norwell MA, 2001; 27-40.