Andress, Jason, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (Elsevier/Syngress, Syngress is a imprint of Elsevier, Second edition, 2014) <https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255>
Boyle, Randall J and Raymond R Panko, Corporate Computer Security (Pearson Education Limited, Fourth edition, Global edition, 2015) <http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=1419253>
Gill, T Grandon and Joni Jones, ‘Multi-Factor Authentication at Jagged Peak’ 1(4) Muma Case Review 1 <http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/>
McLaughlin, Mark-David J et al, ‘Snowfall and a Stolen Laptop’ (2015) 5(2) Journal of Information Technology Teaching Cases 102
McLaughlin, Mark-David J, W Alec Cram and Janis L Gogan, ‘A High Performance Computing Cluster under Attack: The Titan Incident’ (2015) 5(1) Journal of Information Technology Teaching Cases 1
Whitman, Michael E and Herbert J Mattord, Management of Information Security (Cengage Learning, Fifth edition, 2016) <https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253>
Whitman, Michael E and Herbert J Mattord, Principles of Information Security (Cengage Learning, Sixth Edition, 2018)
Whitman, Michael E and Herbert J Mattord, Principles of Information Security (Cengage Learning, Sixth Edition, 2018)
‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED’ <https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/>