1. Albersmeier, F., H. Schulze, G. Jahn, & Spiller, A. (2009). The reliability of third-party certification in the food
chain: from checklists to risk-oriented auditing, Food Control, 20(10), 927–935.
2. Alliance, C., (2011). Security guidance for critical areas of focus in cloud computing V3.0, Cloud Security
Alliance, https://cloudsecurityalliance.org/guidance/ csaguide.v3.0.pdf, (Erişim tarihi: 10.08.2023)
3. Alliance, C. S. (2016). The Treacherous Twelve - Cloud Computing Top Threats İn 2016.
https://cloudsecurityalliance.org/press-releases/2016/02/29/cloud-security-alliance-releases-the-
treacherous-twelve-cloud-computing-top-threats-in-2016/ (Erişim Tarihi: 27.07.2023)
4. Anderson, R. J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems, C. A. Long,
Ed. Wiley USA.
5. Archer, J. & Boehm, A. (2009). Security guidance for critical areas of focus in cloud computing, Cloud Security
Alliance, 2, 1-76.