Andress, Jason. 2014. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Second edition. Amsterdam: Elsevier/Syngress, Syngress is a imprint of Elsevier. https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255.
Boyle, Randall J., and Raymond R. Panko. 2015. Corporate Computer Security. Fourth edition, Global edition. Harlow: Pearson Education Limited. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253.
Gill, T. Grandon, and Joni Jones. n.d. ‘Multi-Factor Authentication at Jagged Peak’. Muma Case Review 1 (4): 1–16. http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/.
McLaughlin, Mark-David J, W Alec Cram, and Janis L Gogan. 2015. ‘A High Performance Computing Cluster under Attack: The Titan Incident’. Journal of Information Technology Teaching Cases 5 (1): 1–7. https://doi.org/10.1057/jittc.2015.1.
McLaughlin, Mark-David J, Sean Hansen, W Alec Cram, and Janis L Gogan. 2015. ‘Snowfall and a Stolen Laptop’. Journal of Information Technology Teaching Cases 5 (2): 102–12. https://doi.org/10.1057/jittc.2015.12.
‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED’. n.d. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Whitman, Michael E., and Herbert J. Mattord. 2016. Management of Information Security. Fifth edition. Boston, MA: Cengage Learning. https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253.
———. 2018a. Principles of Information Security. Sixth Edition. Australia: Cengage Learning.
———. 2018b. Principles of Information Security. Sixth Edition. Australia: Cengage Learning.