Bosworth S., Kabay M. and Whyne E. (2014). Computer Security Handbook. Sixth Edition, Volume 1. John Wiley & Sons, Inc.
|
Donaldson S., Siegel S., Williams C. and Aslam A. (2014). Enterprise Cybersecurity, How to build a successful cyberdefense program against advanced threats. Apress Open
|
Kurose J. and Ross K. (2013). Computer Networking, A Top-Down Approach. Sixth Edition. Addison-Wesley
|
Joseph Migga Kizza (2015). Guide to Computer Network Security. Third Edition. Springer-Verlag London
|
OWASP (2014). OWASP Testing Guide 4.0
|
Umesh Hodeghatta Rao and Nayak U. (2014). The InfoSec Handbook – An Introduction to Information Security. Apress Open
|
National Institute of Standards and Technology (2014). Framework for Improving Critical Infrastructure Cybersecurity. Version 1.0.
|
Stallings, W. (2011). Cryptography and Network Security, Principles and Practice. Fifth Edition. Prentice Hall.
|
Stallings, W. (2012). Computer Security Principles and Practice. Second Edition. Prentice Hall.
|