Raman, J. (2006) Regulating Secure Software Development. University of Lapland Printing Centre, Rovaniemi.
 Sinn, R. (2008) Software Security Technologies: A Programmatic Approach. Thomson Course Technology, Boston.
 Janssen, C. (2010) Data Security. Techopedia.
 Janssen, C. “Information Security (IS)”. Techopedia.
 “Digital Rights Management”. The Free Dictionary.
 Grembi, J.C. (2008) Secure Software Development: A Security Programmer’s Guide. Thomson Course Technology, Boston.
 Oracle, “Java SE Security Documentation”.
 Long, F., Mohindra, D., Seacord, R.C., Sutherland, D.F. and Svoboda, D. (2011) The CERT Oracle Secure Coding Standard for Java, Addison-Wesley Professional.
 What Are the Software Development Life Cycle Phases?
 Howard, M. and Lipner, S. (2004) The Trustworthy Computing Security Development Lifecycle. IEEE 2004 Annual Computer Security Applications Conference, Tucson.
 Davis, N. (2006) Secure Software Development Life Cycle Process. Carnegie Mellon University, Pittsburgh.
 Maconachy, W.V., Schou, C.D., Ragsda, D. and Welch, D. (2001) A Model for Information Assurance: Integrated Approach. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, 5-6 June 2001.
 Allen, J. (2010) Measuring Software Security. Carnegie Mellon University, Pittsburgh.
 Ruiz-Vanoye, J.A., Díaz-Parra, O., Arias, M.D.I.á.B. and Saenz, A.C. (2013) A Model for Evolutionary Software Development with Security (MESS) Applied to an Electrical Research Institute. Mexican Journal of Scientific Research, 2, 2-22.
 Whitman, M.E. and Mattord, H.J. (2012) Principle of Information Security. 4th Edition, Thomson Course Technology, Boston.
 “Review: McCumber Cube Methodology,” Protect Your Bits, 5 October 2009.
 Jone, C. (2012) Software Quality Metrics: Three Harmful Metrics and Two Helpful Metrics.
 Lab, K. (2013) Global Corporate IT Security Risks: 2013.
 Alhazmi, O.H., Malyiya, Y.K. and Ray, I. (2006) Measuring, Analyzing and Predicting Security Vulnerabilities in Software Systems. Computer & Security, 26, 219-228.
 Mohagheghi, P., Conradi, R., Killi, O.M. and Schwarz, H. (2006) An Empirical Study of Software Reuse vs. Defect-Density and Stability. Proceedings of the 26th International Conference on Software Engineering, Edinburgh, 23-28 May 2006, 282-292.
 CWE, CWE-844: Weaknesses Addressed by the CERT Java Secure Coding Standard. Common Weakness Enumeration.
 Oracle, Secure Coding Guidelines for the Java Programming Language, Version 4.0.