[1]
D. Gollmann, Computer Security, 3rd Edition. Chichester: Wiley, 2011 [Online]. Available: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670
[2]
D. Gollmann, Computer Security, 3rd ed. Chichester: Wiley Textbooks, 2011 [Online]. Available: http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182
[3]
C. P. Pfleeger et al, Security in Computing, 5th Edition. Upper Saddle River, NJ: Prentice Hall, 2015.
[4]
W. Ford, Computer Communications Security: Principles, Standards Protocols and Techniques. Englewood Cliffs, N.J.: PTR Prentice Hall, 1994.
[5]
K. M. Martin, Everyday Cryptography: Fundamental Principles and Applications, 2nd Edition. Oxford: Oxford University Press, 2017.
[6]
K. M. Martin, Everyday Cryptography: Fundamental Principles and Applications, Second edition. Oxford: Oxford University Press, 2017 [Online]. Available: http://dx.doi.org/10.1093/oso/9780198788003.001.0001
[7]
K. Markantonakis and K. E. Mayes, Secure Smart Embedded Devices, Platforms and Applications. New York: Springer, 2014 [Online]. Available: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13404624210002671&institutionId=2671&customerId=2670
[8]
K. Markantonakis and K. E. Mayes, Secure Smart Embedded Devices, Platforms and Applications. 2014 [Online]. Available: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719