APPENDIX D

Bibliography

10 Questions on eCommerce (CNET), http://builder.cnet.com/Business/Ecommerce20/.

A Beginner's Guide to B2B Electronic Commerce, http://ecommerce.about.com/smallbusiness/ecommerce/library/weekly/aa021600a.htm.

Aho, Alfred, Monica Lam, Ravi Sethi, and Jeffrey Ullman. Compilers: Principles, Techniques, and Tools, 2nd Edition. New York: Addison-Wesley, 2006.

Anderson, Ross. Security Engineering, 2nd Edition. Hoboken: John Wiley & Sons, 2008.

Armbrust, Michael and Armando Fox. “Above the Clouds: A Berkeley View of Cloud Computing,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2009-28, February 10, 2009, www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.

Balding, Craig. “ITG2008 World Cloud Computing Summit,” 2008, http://cloudsecurity.org.

BEinGRID Project. Gridipedia: GridDic, “The Grid Computing Glossary, 2009,” www.gridipedia.eu/grid-computing-glossary.html.

Brodkin, Jon. “Seven Cloud-Computing Security Risks,” 2008, www.networkworld.com/news/2008/070208-cloud.html.

Burnett, Steve. RSA Security's Official Guide to Cryptography. New York: McGraw-Hill, 2004.

Burns, Bryan, Dave Killion, Nicolas Beauchesne, Eric Moret, et al. Security Power Tools. Sebastopol: O'Reilly Media, 2007.

Burton Group. “Attacking and Defending Virtual Environments,” www.burtongroup.com/Guest/Srms/AttackingDefendingVirtual.aspx.

Cavoukian, Ann. “Privacy in the Clouds — A White Paper on Privacy and Digital Identity: ...

Get Web Commerce Security Design and Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.