10 Questions on eCommerce (CNET),

A Beginner's Guide to B2B Electronic Commerce,

Aho, Alfred, Monica Lam, Ravi Sethi, and Jeffrey Ullman. Compilers: Principles, Techniques, and Tools, 2nd Edition. New York: Addison-Wesley, 2006.

Anderson, Ross. Security Engineering, 2nd Edition. Hoboken: John Wiley & Sons, 2008.

Armbrust, Michael and Armando Fox. “Above the Clouds: A Berkeley View of Cloud Computing,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2009-28, February 10, 2009,

Balding, Craig. “ITG2008 World Cloud Computing Summit,” 2008,

BEinGRID Project. Gridipedia: GridDic, “The Grid Computing Glossary, 2009,”

Brodkin, Jon. “Seven Cloud-Computing Security Risks,” 2008,

Burnett, Steve. RSA Security's Official Guide to Cryptography. New York: McGraw-Hill, 2004.

Burns, Bryan, Dave Killion, Nicolas Beauchesne, Eric Moret, et al. Security Power Tools. Sebastopol: O'Reilly Media, 2007.

Burton Group. “Attacking and Defending Virtual Environments,”

Cavoukian, Ann. “Privacy in the Clouds — A White Paper on Privacy and Digital Identity: ...

Get Web Commerce Security Design and Development now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.