[1]
D. Gollmann, Computer Security, 3rd ed. Chichester: Wiley, 2011.
[2]
D. Gollmann, Computer Security, 3rd ed. Chichester: Wiley Textbooks, 2011 [Online]. Available: http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182
[3]
C. P. Pfleeger, S. L. Pfleeger, and J. Margulies, Security in Computing, Fifth edition. Upper Saddle River, NJ: Prentice Hall, 2015.
[4]
C. P. Pfleeger, S. L. Pfleeger, and J. Margulies, Security in Computing, Fifth edition. Upper Saddle River, NJ: Prentice Hall, 2015 [Online]. Available: https://learning.oreilly.com/library/view/-/9780134085074/?ar
[5]
Computer Security: Art and Science, 2nd ed. Boston: Pearson Education, 2018.
[6]
W. Stallings and L. Brown, Computer Security: Principles and Practice, Fourth edition. New York, NY: Pearson, 2018.
[7]
W. Stallings and L. Brown, Computer Security: Principles and Practice, Third edition, Global edition. Harlow: Pearson Education, 2015 [Online]. Available: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138826
[8]
R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. Indianapolis: Wiley Publishing, Inc, 2008.
[9]
R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. Indianapolis, Ind: Wiley Pub, 2008 [Online]. Available: https://www.safaribooksonline.com/library/view/-/9780470068526/?ar
[10]
S. M. Bellovin, Thinking Security: Stopping Next Year’s Hackers. New York: Addison-Wesley, 2016 [Online]. Available: https://www.safaribooksonline.com/library/view/-/9780134278223/?ar