1.
Gollmann D. Computer Security. 3rd ed. Chichester: Wiley; 2011.
2.
Gollmann D. Computer Security [Internet]. 3rd ed. Chichester: Wiley Textbooks; 2011. Available from: http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182
3.
Pfleeger CP, Pfleeger SL, Margulies J. Security in Computing. Fifth edition. Upper Saddle River, NJ: Prentice Hall; 2015.
4.
Pfleeger CP, Pfleeger SL, Margulies J. Security in Computing [Internet]. Fifth edition. Upper Saddle River, NJ: Prentice Hall; 2015. Available from: https://learning.oreilly.com/library/view/-/9780134085074/?ar
5.
Computer Security: Art and Science. 2nd ed. Boston: Pearson Education; 2018.
6.
Stallings W, Brown L. Computer Security: Principles and Practice. Fourth edition. New York, NY: Pearson; 2018.
7.
Stallings W, Brown L. Computer Security: Principles and Practice [Internet]. Third edition, Global edition. Harlow: Pearson Education; 2015. Available from: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=5138826
8.
Anderson R. Security Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed. Indianapolis: Wiley Publishing, Inc; 2008.
9.
Anderson R. Security Engineering: A Guide to Building Dependable Distributed Systems [Internet]. 2nd ed. Indianapolis, Ind: Wiley Pub; 2008. Available from: https://www.safaribooksonline.com/library/view/-/9780470068526/?ar
10.
Bellovin SM. Thinking Security: Stopping Next Year’s Hackers [Internet]. New York: Addison-Wesley; 2016. Available from: https://www.safaribooksonline.com/library/view/-/9780134278223/?ar