- Apache Software Foundation (2016). Cassandra Documentation - Operations - Hardware Choices. Apache Software Foundation - Cassandra project site. Retrieved on 20170603 from: http://cassandra.apache.org/doc/latest/operating/hardware.html
- Apache Software Foundation (2016). Cassandra Documentation - Downloads. Apache Software Foundation - Cassandra project site. Retrieved on 20170603 from: http://cassandra.apache.org/download/
- Brenner B. (2017). Thousands of MongoDB databases compromised and held to ransom. Naked Security by Sophos. Retrieved on 20170604 from: https://nakedsecurity.sophos.com/2017/01/11/thousands-of-mongodb-databases-compromised-and-held-to-ransom/
- Brewer E., Fox, A. (1999). Harvest, Yield, and Scalable Tolerant Systems. University of California at Berkeley. Berkeley, CA Doi: 10.1.1.24.3690. Retrieved on 20170530 from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.3690&rep=rep1&type=pdf
- Cimpanu C. (2017). A Benevolent Hacker Is Warning Owners of Unsecured Cassandra Databases. Bleeping Computer. Retrieved on 20170604 from: https://www.bleepingcomputer.com/news/security/a-benevolent-hacker-is-warning-owners-of-unsecured-cassandra-databases/
- DataStax. (2017). How is data read? DataStax 3.0 documentation. Retrieved on 20170916 from: http://docs.datastax.com/en/archived/cassandra/3.x/cassandra/dml/dmlAboutReads.html
- Decandia G., Hastorun D., Jampani M., Kakulapati G., Lakshman A., Pilchin A., et-al. (2007). Dynamo: Amazon's Highly Available Key-value Store. Proceedings of the Twenty-First ACM SIGOPS Symposium on Operating Systems Principles (pp. 205-220). Doi: 10.1145/1294261.1294281