Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Second edition. Amsterdam: Elsevier/Syngress, Syngress is a imprint of Elsevier, 2014. https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255.
Boyle, Randall J., and Raymond R. Panko. Corporate Computer Security. Fourth edition, Global edition. Harlow: Pearson Education Limited, 2015. http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253.
Gill, T. Grandon, and Joni Jones. ‘Multi-Factor Authentication at Jagged Peak’. Muma Case Review 1, no. 4 (n.d.): 1–16. http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/.
McLaughlin, Mark-David J, W Alec Cram, and Janis L Gogan. ‘A High Performance Computing Cluster under Attack: The Titan Incident’. Journal of Information Technology Teaching Cases 5, no. 1 (May 2015): 1–7. https://doi.org/10.1057/jittc.2015.1.
McLaughlin, Mark-David J, Sean Hansen, W Alec Cram, and Janis L Gogan. ‘Snowfall and a Stolen Laptop’. Journal of Information Technology Teaching Cases 5, no. 2 (November 2015): 102–12. https://doi.org/10.1057/jittc.2015.12.
‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED’, n.d. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Whitman, Michael E., and Herbert J. Mattord. Management of Information Security. Fifth edition. Boston, MA: Cengage Learning, 2016. https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253.
———. Principles of Information Security. Sixth Edition. Australia: Cengage Learning, 2018.
———. Principles of Information Security. Sixth Edition. Australia: Cengage Learning, 2018.