Šaltiniai
- http://countermeasures.trendmicro.eu/skype-vulnerability/
- http://projects.webappsec.org/w/page/13246949/Null%20Byte%20Injection
- http://en.wikipedia.org/wiki/Trust_boundary
- http://en.wikipedia.org/wiki/Privilege_escalation
- https://www.owasp.org/
- http://en.wikipedia.org/wiki/SQL_injection
- http://www.php.net/manual/en/function.mysql-real-escape-string.php
- http://www.tinklusaugumas.lt/cgi-bin/moin.py/Same%20Origin%20Policy
- http://en.wikipedia.org/wiki/Document_Object_Model
- http://www.acunetix.com/blog/web-security-zone/dom-xss/
- https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
- http://www.portswigger.net/burp/sequencer.html
- https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
- https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet
- https://www.owasp.org/index.php/Top_10_2010-A6
- http://en.wikipedia.org/wiki/Avalanche_effect
- http://codahale.com/how-to-safely-store-a-password/
- http://codebutler.com/firesheep/
- http://www.troyhunt.com/2011/12/owasp-top-10-for-net-developers-part-10.html
- http://www.sqlmag.com/article/permissions/preventing-sql-injection-attack
- http://en.wikipedia.org/wiki/Hash-based_message_authentication_code
- Web Application Hacker’s Handbook, Second Edition.
- https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines
- http://php.net/manual/en/book.mysqli.php
- http://htmlpurifier.org/
- http://www.dvwa.co.uk/
- http://www.oxid.it/cain.html
- http://en.wikipedia.org/wiki/Remote_file_inclusion
- http://en.wikipedia.org/wiki/Collision_attack
- http://www.lrytas.lt/verslas/it-ir-technologijos/viesi-bevieliai-tinklai-kaip-saugiai-naudotis.htm