Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice (Second edition). Elsevier/Syngress, Syngress is a imprint of Elsevier. https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255
Boyle, R. J., & Panko, R. R. (2015). Corporate computer security (Fourth edition, Global edition). Pearson Education Limited. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253
Gill, T. G., & Jones, J. (n.d.). Multi-Factor Authentication at Jagged Peak. Muma Case Review, 1(4), 1–16. http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/
McLaughlin, M.-D. J., Cram, W. A., & Gogan, J. L. (2015). A high performance computing cluster under attack: the Titan incident. Journal of Information Technology Teaching Cases, 5(1), 1–7. https://doi.org/10.1057/jittc.2015.1
McLaughlin, M.-D. J., Hansen, S., Cram, W. A., & Gogan, J. L. (2015). Snowfall and a stolen laptop. Journal of Information Technology Teaching Cases, 5(2), 102–112. https://doi.org/10.1057/jittc.2015.12
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED. (n.d.). https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
Whitman, M. E., & Mattord, H. J. (2016). Management of information security (Fifth edition). Cengage Learning. https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253
Whitman, M. E., & Mattord, H. J. (2018a). Principles of information security (Sixth Edition). Cengage Learning.
Whitman, M. E., & Mattord, H. J. (2018b). Principles of information security (Sixth Edition). Cengage Learning.