Benbasat, I., & Freedman, D. (1997). Interface design for open APIs.Journal of Computer Science, 12(3), pp. 233–245.
Newman, S. (2015). Building Microservices.O’Reilly Media.
Sutton, R. S., & Barto, A. G. (2018). Reinforcement Learning: An Introduction (2nd ed.).MIT Press.
Turing, A. M. (1950). Computing machinery and intelligence.Mind, 59(236), pp. 433–460.
Kardashev, N. S. (1964). Transmission of information by extraterrestrial civilizations.Soviet Astronomy, 8(2), pp. 217–221.
Shklovskiĭ, I. S., & Sagan, C. (1966). Intelligent Life in the Universe.Holden-Day.
Vakoch, D., & Harrison, A. (Eds.) (2011). The Drake Equation: Estimating the Prevalence of Extraterrestrial Life through the Ages.Cambridge University Press.
Davies, P. C. W. (2010). The Eerie Silence: Renewing Our Search for Alien Intelligence.Houghton Mifflin Harcourt.
Tegmark, M. (2003). Parallel Universes.Scientific American, 288(5), pp. 40–51.
Ćirković, M. M. (2018). The Great Silence: Science and Philosophy of Fermi’s Paradox (3rd ed.).Oxford University Press.
Docsy (2023). Docsy: Documentation Website Guide.Docsy.[Link]
Hugo (n.d.). Hugo Documentation.Hugo.[Link]
What If (2023, December 14). The Kardashev Scale: Type I to Type VII Civilizations [Video].YouTube.[Link]
Wisdom for Life (2021). Fermi Paradox – Where are all the Aliens? [Video].YouTube.
World Knowledge Forum (2025). The Ethics of AI │ Stuart J. Russell (UC Berkeley) [Video].YouTube.
Abadi, M., et al. (2016). TensorFlow: Large-scale machine learning on heterogeneous systems.arXiv, 1603.04467.
LangChain (2023). LangChain Documentation.LangChain.[Link]
Hunter, J. D. (2007). Matplotlib: A 2D graphics environment.Computing in Science & Engineering, 9(3), pp. 90–95.
Council of Europe (1981). Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (ETS No. 108).Council of Europe.[Link]
Council of Europe (2001). Convention on Cybercrime (ETS No. 185).Council of Europe.[Link]
European Union (2016). Regulation (EU) 2016/679 (GDPR).EUR-Lex.[Link]
African Union (2014). African Union Convention on Cyber Security and Personal Data Protection.African Union.[Link]
Brazil (2018). Lei Geral de Proteção de Dados Pessoais (LGPD).Brazil.[Link]
United States (1996). Health Insurance Portability and Accountability Act of 1996 (HIPAA).Public Law 104–191.[Link]
United States (1998). Children’s Online Privacy Protection Act (COPPA).US Code Title 15, Chap. 91.[Link]
United States (2018). California Consumer Privacy Act of 2018 (CCPA).California Legislature.[Link]
Canada (2000). Personal Information Protection and Electronic Documents Act (PIPEDA).Justice Laws Website.[Link]
China (2021). Personal Information Protection Law of the People’s Republic of China.National People’s Congress.[Link]
India (2023). Digital Personal Data Protection Act, 2023.Ministry of Electronics & IT, India.[Link]
South Africa (2013). Protection of Personal Information Act (POPIA).Government of South Africa.[Link]
United Kingdom (2018). Data Protection Act 2018.Legislation.gov.uk.[Link]
Australia (1988). Privacy Act 1988.Federal Register of Legislation.[Link]
United States (2018). 50 U.S.C. § 3341. Security clearances.US Code.[Link]
United States (2009). Executive Order No. 13526: Classified National Security Information.Federal Register, Vol. 75, No. 248.
Department of Defense (2013). National Industrial Security Program Operating Manual (NISPOM).DoD.
U.S. General Services Administration (n.d.). Federal Acquisition Regulation (48 C.F.R. Chapter 1).GSA.
U.S. Department of State (n.d.). Security Clearances.U.S. Department of State.[Link]