1.
Gollmann D. Computer Security. 3rd Edition. Wiley; 2011. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670
2.
Gollmann D. Computer Security. 3rd ed. Wiley Textbooks; 2011. http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182
3.
Pfleeger et al CP. Security in Computing. 5th Edition. Prentice Hall; 2015.
4.
Ford W. Computer Communications Security: Principles, Standards Protocols and Techniques. PTR Prentice Hall; 1994.
5.
Martin KM. Everyday Cryptography: Fundamental Principles and Applications. 2nd Edition. Oxford University Press; 2017.
6.
Martin KM. Everyday Cryptography: Fundamental Principles and Applications. Second edition. Oxford University Press; 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001
7.
Markantonakis K, Mayes KE. Secure Smart Embedded Devices, Platforms and Applications. Springer; 2014. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13404624210002671&institutionId=2671&customerId=2670
8.
Markantonakis K, Mayes KE. Secure Smart Embedded Devices, Platforms and Applications.; 2014. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719