Vulnerabilities in SaaS layer of cloud computing
Procedures for Responding to Attacks on Computers Chapter 7.