Ford, W. (1994) Computer Communications Security: Principles, Standards Protocols and Techniques. Englewood Cliffs, N.J.: PTR Prentice Hall.
Gollmann, D. (2011) Computer Security. 3rd Edition. Chichester: Wiley. Available at: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670.
Markantonakis, K. and Mayes, K. (2013) Secure Smart Embedded Devices, Platforms and Applications. Springer-Verlag. Available at: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399107360002671&institutionId=2671&customerId=2670.
Markantonakis, K. and Mayes, K.E. (2014) Secure Smart Embedded Devices, Platforms and Applications. Available at: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719.
Martin, K.M. (2012) Everyday Cryptography: Fundamental Principles and Applications. Oxford: Oxford University Press. Available at: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399196550002671&institutionId=2671&customerId=2670.
Martin, K.M. (2014) Everyday Cryptography: Fundamental Principles and Applications. Oxford: OUP Oxford. Available at: https://www-dawsonera-com.ezproxy01.rhul.ac.uk/abstract/9780191625879.
Pfleeger et al, C.P. (2015) Security in Computing. 5th Edition. Upper Saddle River, NJ: Prentice Hall.