Ford, W. (1994) Computer Communications Security: Principles, Standards Protocols and Techniques. Englewood Cliffs, N.J.: PTR Prentice Hall.
Gollmann, D. (2011a) Computer Security. 3rd Edition. Chichester: Wiley. Available at: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670.
Gollmann, D. (2011b) Computer Security. 3rd ed. Chichester: Wiley Textbooks. Available at: http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182.
Markantonakis, K. and Mayes, K.E. (2014a) Secure Smart Embedded Devices, Platforms and Applications. New York: Springer. Available at: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13404624210002671&institutionId=2671&customerId=2670.
Markantonakis, K. and Mayes, K.E. (2014b) Secure Smart Embedded Devices, Platforms and Applications. Available at: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719.
Martin, K.M. (2017a) Everyday Cryptography: Fundamental Principles and Applications. 2nd Edition. Oxford: Oxford University Press.
Martin, K.M. (2017b) Everyday Cryptography: Fundamental Principles and Applications. Second edition. Oxford: Oxford University Press. Available at: http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Pfleeger et al, C.P. (2015) Security in Computing. 5th Edition. Upper Saddle River, NJ: Prentice Hall.