Sotirov, A. I. (2002). Automatic vulnerability detection using static source code analysys.
Graff, M. G., Van Wyk, K. R. (2003). Secure Coding: Principles & Practices. O'Reilly. Hewlett-Packard Development Company (2011). Top Cyber Security Risks Report.
INCIBE. (2011). Cuaderno de notas del Observatorio ¿Qué son las vulnerabilidades del software?
MITRE (2012). CVE Introductory Brochure. A brief two-page introduction to the CVE Initiative.
MITRE. (2012). CWE Introductory Brochure A brief two-page introduction to the CWE initiative.
MITRE. (2011). CWE/SANS Top 25 Most Dangerous Software Errors.
OWASP TOP 10. (2013). Los diez riesgos más importantes en aplicaciones WEB.
Howard, M., LeBlanc, D. (2003). Writing Secure Code. Microsoft Press.
Howard, M., Lipner, S. (2006). The Security Development Lifecycle: SDL: A Process for
Developing Demonstrably Secure Software. Microsoft Press.
Mano Paul (2014). The official (ISC)2® guide to the CSSLP. CRC Press.
McGraw, G. (2005). Software Security: Building Security In. Addison Wesley Professional.