[1] Neiger, G., Santoni, A., Leung, F. and Rodgers, D. (2006) Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10, 167.
http://dx.doi.org/10.1535/itj
[2] Neuman, L.W. (2006) Social Research Methods: Qualitative and Quantitative Approaches. 6th Editon, Allyn and Bacon, Boston.
[3] Nikhil, B. (2009) Performance Evaluation of Intel EPT Hardware Assist. VMware, Inc., California. http://www.vmware.com
[4] Nikitasha, P., Jyotiprakash, S., Subasish, M. and Prasanna, P.S. (2011) A Security Framework for Virtualization Based Computing Environment. International Journal of Engineering Science and Technology, 3, 6423-6429. http://www.techrepublic.com/research-library
[5] Park, Y.R. and Sharma, S. (2009) Providing Service Using a Virtualization Infrastructure. Journal of Service Science, 2, 17-22. http://search.proquest.com/docview/195627357?accountid=35812
[6] Payne, B.D. (2010) Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis. Georgia Institute of Technology, Atlanta. http://www.bryanpayne.org/
[7] Peng, Q. and Yu, C. (2007) Enhanced Integrated Manufacturing Systems in an Immersive Virtual Environment. Proceedings of the Institution of Mechanical Engineers, 221, 477-487.
http://search.proquest.com/docview/195146511?accountid=35812
http://dx.doi.org/10.1243/09544054JEM453
[8] Perkins, G.H. (2004) Will Libraries’ Web-Based Survey Methods Replace Existing Nonelectronic Survey Methods. Information Technology and Libraries, 23, 123-126.
[9] Petter, S., Delone, W. and McLean, E. (2008) Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships. European Journal of Information Systems, 17, 236-263. http://www.palgrave-journals.com http://dx.doi.org/10.1057/ejis.2008.15
[10] Pozgaj, Z. and Strahonja, J. (2008) It Service Management Based on Itil Methodology. 965-978. http://search.proquest.com/docview/217738441?accountid=35812
[11] Prism MicroSystems (2010) 2010 State of Virtualization Security Survey.
http://www.prismmicrosys.com/documents/VirtualizationSecuritySurvey2010.pdf
[12] Reichman, A. (2009) Rethinking Storage for Server Virtualization Environments. TechTarget.
http://searchservervirtualization.techtarget.com
[13] Rosnow, R.L. and Rosenthal, R. (2008) Beginning Behavioral Research: A Conceptual Primer. 6th Edition, Pearson Prentice Hall, Upper Saddle River.
[14] RSA List Service (2012) Fortune 1000 Company List. http://www.rsalistsinc.com
[15] Samoilenko, S. (2008) Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories. Information Systems Frontiers, 10, 281-292. http://dx.doi.org/10.1007/s10796-008-9078-3
[16] Sandifer, C. (2008) The Economics of Virtualization. University of South Carolina, Columbia. http://search.proquest.com
[17] Scadden, R., Bogdany, R., Clifford, J., Pearthree, H. and Locke, R. (2008) Resilient Hosting in a Continuously Available Virtualized Environment. IBM Systems Journal, 47, 535-548.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5386523
http://dx.doi.org/10.1147/SJ.2008.5386523
[18] Seiler, S. and Pfister, A.C. (2009) Why Did I Do This: Understanding Leadership Behavior through a Dynamic Five-Factor Model of Leadership? Journal of Leadership Studies, 3, 41-52.
http://dx.doi.org/10.1002/jls.20122