Chapter 3
12. Intel Corporation, 2007. The Spectrum of Risk Management in a Technology Company. [Published and Electronic Document]. [Cited 4.3.2008]. Available at: http://www.intel.com/technology/itj/2007/v11i2/5-restricted-countries/5-methodology.htm
13. MCI Corporation, 2002. IT Security Risk Management. [Electronic PDF Document]. [Cited 29.2.2008]. Available at: http://global.mci.com/ca/resources/whitepapers/pdf/Gerschefske1.pdf
14. ComputerWorld.com, 2006. Five mistakes of vulnerability management. [Electronic Document].[Cited 27.2.2008]. Available at: http://www.computerworld.com/printthis/2006/0,4814,107647,00.html
15. Microsoft Corporation, 2004. Security Risk Management Guide. [Electronic Technet Document]. [Cited 3.3.2008]. Available at: http://www.microsoft.com/technet/security/guidance/complianceandpolicies/secrisk/default.mspx
16. Microsoft Corporation, 2006. Windows Server 2003 Security Guide. [Electronic Document download]. [Cited 3.3.2008]. Available at: http://www.microsoft.com/downloads/details.aspx? FamilyID=8A2643C1-0685-4D89-B655-521EA6C7B4DB&displaylang=en
17. Microsoft Corporation, 2004. Security Risk Management Guide. [Electronic Document].[Cited 4.3.2008]. Available at: http://www.microsoft.com/technet/security/guidance/complianceandpolicies/secrisk/srsgch01.mspx