Ford, W. (1994). Computer Communications Security: Principles, Standards Protocols and Techniques. PTR Prentice Hall.
Gollmann, D. (2011a). Computer Security (3rd Edition). Wiley. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670
Gollmann, D. (2011b). Computer Security (3rd ed). Wiley Textbooks. http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182
Markantonakis, K., & Mayes, K. E. (2014a). Secure Smart Embedded Devices, Platforms and Applications. Springer. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13404624210002671&institutionId=2671&customerId=2670
Markantonakis, K., & Mayes, K. E. (2014b). Secure Smart Embedded Devices, Platforms and Applications. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719
Martin, K. M. (2017a). Everyday Cryptography: Fundamental Principles and Applications (2nd Edition). Oxford University Press.
Martin, K. M. (2017b). Everyday Cryptography: Fundamental Principles and Applications (Second edition). Oxford University Press. http://dx.doi.org/10.1093/oso/9780198788003.001.0001
Pfleeger et al, C. P. (2015). Security in Computing (5th Edition). Prentice Hall.