Ford, Warwick. 1994. Computer Communications Security: Principles, Standards Protocols and Techniques. Englewood Cliffs, N.J.: PTR Prentice Hall.
Gollmann, Dieter. 2011a. Computer Security. 3rd Edition. Chichester: Wiley. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670.
———. 2011b. Computer Security. 3rd ed. Chichester: Wiley Textbooks. http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182.
Markantonakis, Konstantinos, and Keith E. Mayes. 2014a. Secure Smart Embedded Devices, Platforms and Applications. New York: Springer. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13404624210002671&institutionId=2671&customerId=2670.
———. 2014b. Secure Smart Embedded Devices, Platforms and Applications. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719.
Martin, Keith M. 2017a. Everyday Cryptography: Fundamental Principles and Applications. 2nd Edition. Oxford: Oxford University Press.
———. 2017b. Everyday Cryptography: Fundamental Principles and Applications. Second edition. Oxford: Oxford University Press. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Pfleeger et al, Charles P. 2015. Security in Computing. 5th Edition. Upper Saddle River, NJ: Prentice Hall.