[1]
M. E. Whitman and H. J. Mattord, Principles of information security, Sixth Edition. Australia: Cengage Learning, 2018.
[2]
R. J. Boyle and R. R. Panko, Corporate computer security, Fourth edition, Global edition. Harlow: Pearson Education Limited, 2015. [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253
[3]
M. E. Whitman and H. J. Mattord, Management of information security, Fifth edition. Boston, MA: Cengage Learning, 2016. [Online]. Available: https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253
[4]
J. Andress, The basics of information security: understanding the fundamentals of InfoSec in theory and practice, Second edition. Amsterdam: Elsevier/Syngress, Syngress is a imprint of Elsevier, 2014. [Online]. Available: https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255
[5]
M. E. Whitman and H. J. Mattord, Principles of information security, Sixth Edition. Australia: Cengage Learning, 2018.
[6]
T. G. Gill and J. Jones, ‘Multi-Factor Authentication at Jagged Peak’, Muma Case Review, vol. 1, no. 4, pp. 1–16, [Online]. Available: http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/
[7]
M.-D. J. McLaughlin, S. Hansen, W. A. Cram, and J. L. Gogan, ‘Snowfall and a stolen laptop’, Journal of Information Technology Teaching Cases, vol. 5, no. 2, pp. 102–112, Nov. 2015, doi: 10.1057/jittc.2015.12.
[8]
M.-D. J. McLaughlin, W. A. Cram, and J. L. Gogan, ‘A high performance computing cluster under attack: the Titan incident’, Journal of Information Technology Teaching Cases, vol. 5, no. 1, pp. 1–7, May 2015, doi: 10.1057/jittc.2015.1.
[9]
‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED’. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/