APPENDIX D
Bibliography
10 Questions on eCommerce (CNET), http://builder.cnet.com/Business/Ecommerce20/.
A Beginner's Guide to B2B Electronic Commerce, http://ecommerce.about.com/smallbusiness/ecommerce/library/weekly/aa021600a.htm.
Aho, Alfred, Monica Lam, Ravi Sethi, and Jeffrey Ullman. Compilers: Principles, Techniques, and Tools, 2nd Edition. New York: Addison-Wesley, 2006.
Anderson, Ross. Security Engineering, 2nd Edition. Hoboken: John Wiley & Sons, 2008.
Armbrust, Michael and Armando Fox. “Above the Clouds: A Berkeley View of Cloud Computing,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2009-28, February 10, 2009, www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.
Balding, Craig. “ITG2008 World Cloud Computing Summit,” 2008, http://cloudsecurity.org.
BEinGRID Project. Gridipedia: GridDic, “The Grid Computing Glossary, 2009,” www.gridipedia.eu/grid-computing-glossary.html.
Brodkin, Jon. “Seven Cloud-Computing Security Risks,” 2008, www.networkworld.com/news/2008/070208-cloud.html.
Burnett, Steve. RSA Security's Official Guide to Cryptography. New York: McGraw-Hill, 2004.
Burns, Bryan, Dave Killion, Nicolas Beauchesne, Eric Moret, et al. Security Power Tools. Sebastopol: O'Reilly Media, 2007.
Burton Group. “Attacking and Defending Virtual Environments,” www.burtongroup.com/Guest/Srms/AttackingDefendingVirtual.aspx.
Cavoukian, Ann. “Privacy in the Clouds — A White Paper on Privacy and Digital Identity: ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access