Andress, Jason. 2014. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Second edition. Elsevier/Syngress, Syngress is a imprint of Elsevier. https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255.
Boyle, Randall J., and Raymond R. Panko. 2015. Corporate Computer Security. Fourth edition, Global edition. Pearson Education Limited. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253.
Gill, T. Grandon, and Joni Jones. n.d. ‘Multi-Factor Authentication at Jagged Peak’. Muma Case Review 1 (4): 1–16. http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/.
McLaughlin, Mark-David J, W Alec Cram, and Janis L Gogan. 2015. ‘A High Performance Computing Cluster under Attack: The Titan Incident’. Journal of Information Technology Teaching Cases 5 (1): 1–7. https://doi.org/10.1057/jittc.2015.1.
McLaughlin, Mark-David J, Sean Hansen, W Alec Cram, and Janis L Gogan. 2015. ‘Snowfall and a Stolen Laptop’. Journal of Information Technology Teaching Cases 5 (2): 102–12. https://doi.org/10.1057/jittc.2015.12.
‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED’. n.d. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Whitman, Michael E., and Herbert J. Mattord. 2016. Management of Information Security. Fifth edition. Cengage Learning. https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253.
Whitman, Michael E., and Herbert J. Mattord. 2018a. Principles of Information Security. Sixth Edition. Cengage Learning.
Whitman, Michael E., and Herbert J. Mattord. 2018b. Principles of Information Security. Sixth Edition. Cengage Learning.