Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Second edition, Elsevier/Syngress, Syngress is a imprint of Elsevier, 2014, https://ebookcentral.proquest.com/lib/VUW/detail.action?docID=1699255.
Boyle, Randall J., and Raymond R. Panko. Corporate Computer Security. Fourth edition, Global edition, Pearson Education Limited, 2015, http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1419253.
Gill, T. Grandon, and Joni Jones. ‘Multi-Factor Authentication at Jagged Peak’. Muma Case Review, vol. 1, no. 4, pp. 1–16, http://mumacasereview.org/multi-factor-authentication-at-jagged-peak/.
McLaughlin, Mark-David J., W. Alec Cram, et al. ‘A High Performance Computing Cluster under Attack: The Titan Incident’. Journal of Information Technology Teaching Cases, vol. 5, no. 1, May 2015, pp. 1–7, https://doi.org/10.1057/jittc.2015.1.
McLaughlin, Mark-David J., Sean Hansen, et al. ‘Snowfall and a Stolen Laptop’. Journal of Information Technology Teaching Cases, vol. 5, no. 2, Nov. 2015, pp. 102–12, https://doi.org/10.1057/jittc.2015.12.
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Whitman, Michael E., and Herbert J. Mattord. Management of Information Security. Fifth edition, Cengage Learning, 2016, https://ebookcentral.proquest.com/lib/vuw/detail.action?docID=5231253.
---. Principles of Information Security. Sixth Edition, Cengage Learning, 2018.
---. Principles of Information Security. Sixth Edition, Cengage Learning, 2018.