Leavitt N, 2009 yil, 'Bulutli hisoblash haqiqatan ham asosiy vaqtga tayyormi?', Kompyuter, jild. 42, 15-20 betlar, 2009 y.
Weinhardt C, Anandasivam A, Blau B va Stosser J, "Xizmat dunyosidagi biznes modellari", IT Professional, jild. 11, 28-33 betlar, 2009 yil.
Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’,IDC eXchange, viewed 18 February 2010, from
A Platform Computing Whitepaper, ‘Enterprise Cloud Computing:Transforming IT’, Platform Computing, pp6, viewed 13 March 2010.
Dooley B, 2010 yil, "Gibrid bulutning me'moriy talablari", Axborotni boshqarish Onlayn, 10 fevral 2010 yil,
Global Netoptex Incorporated, 2009, Demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com, pp 4-14, viewed 13 December 2009.
Lofstrand M, ‘The VeriScale Architecture: Elasticity and Efficiency for Private Clouds”, Sun Microsystems, Sun BluePrint, Online, Part No 821-0248-11, Revision 1.1, 09/22/09
Tasvir krediti: https://pixabay.com/uz/network-security-technology-data-3482974/
Tasvir krediti: https://www.flickr.com/photos/111692634@N04/18709586962
Xonanda, Piter U va Allan Fridman. Kiberxavfsizlik va Cyberwar. Oksford: Oksford universiteti matbuoti, 2014. Chop etish
Kizza, Jozef Migga. Kompyuter tarmog'ining xavfsizligi bo'yicha qo'llanma. Berlin: Springer, 2017. Chop etish
Harrington, Jan L. Tarmoq xavfsizligi: amaliy yondashuv. Kembrij: Akademik matbuot, 2005 yil. Chop etish