APPENDIX D

Bibliography

10 Questions on eCommerce (CNET), http://builder.cnet.com/Business/Ecommerce20/.

A Beginner's Guide to B2B Electronic Commerce, http://ecommerce.about.com/smallbusiness/ecommerce/library/weekly/aa021600a.htm.

Aho, Alfred, Monica Lam, Ravi Sethi, and Jeffrey Ullman. Compilers: Principles, Techniques, and Tools, 2nd Edition. New York: Addison-Wesley, 2006.

Anderson, Ross. Security Engineering, 2nd Edition. Hoboken: John Wiley & Sons, 2008.

Armbrust, Michael and Armando Fox. “Above the Clouds: A Berkeley View of Cloud Computing,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2009-28, February 10, 2009, www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.

Balding, Craig. “ITG2008 World Cloud Computing Summit,” 2008, http://cloudsecurity.org.

BEinGRID Project. Gridipedia: GridDic, “The Grid Computing Glossary, 2009,” www.gridipedia.eu/grid-computing-glossary.html.

Brodkin, Jon. “Seven Cloud-Computing Security Risks,” 2008, www.networkworld.com/news/2008/070208-cloud.html.

Burnett, Steve. RSA Security's Official Guide to Cryptography. New York: McGraw-Hill, 2004.

Burns, Bryan, Dave Killion, Nicolas Beauchesne, Eric Moret, et al. Security Power Tools. Sebastopol: O'Reilly Media, 2007.

Burton Group. “Attacking and Defending Virtual Environments,” www.burtongroup.com/Guest/Srms/AttackingDefendingVirtual.aspx.

Cavoukian, Ann. “Privacy in the Clouds — A White Paper on Privacy and Digital Identity: ...

Get Web Commerce Security Design and Development now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.