Andress, J. (2014) The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Second edition. Amsterdam: Elsevier/Syngress, Syngress is a imprint of Elsevier. Available at: https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255.
Boyle, R.J. and Panko, R.R. (2015) Corporate computer security. Fourth edition, Global edition. Harlow: Pearson Education Limited. Available at: http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253.
Gill, T.G. and Jones, J. (no date) ‘Multi-Factor Authentication at Jagged Peak’, Muma Case Review, 1(4), pp. 1–16. Available at: http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/.
McLaughlin, M.-D.J. et al. (2015) ‘Snowfall and a stolen laptop’, Journal of Information Technology Teaching Cases, 5(2), pp. 102–112. Available at: https://doi.org/10.1057/jittc.2015.12.
McLaughlin, M.-D.J., Cram, W.A. and Gogan, J.L. (2015) ‘A high performance computing cluster under attack: the Titan incident’, Journal of Information Technology Teaching Cases, 5(1), pp. 1–7. Available at: https://doi.org/10.1057/jittc.2015.1.
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED (no date). Available at: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Whitman, M.E. and Mattord, H.J. (2016) Management of information security. Fifth edition. Boston, MA: Cengage Learning. Available at: https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253.
Whitman, M.E. and Mattord, H.J. (2018a) Principles of information security. Sixth Edition. Australia: Cengage Learning.
Whitman, M.E. and Mattord, H.J. (2018b) Principles of information security. Sixth Edition. Australia: Cengage Learning.