1.
Gollmann D. Computer Security [Internet]. 3rd Edition. Chichester: Wiley; 2011. Available from: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399207160002671&institutionId=2671&customerId=2670
2.
Gollmann D. Computer Security [Internet]. 3rd ed. Chichester: Wiley Textbooks; 2011. Available from: http://ebookcentral.proquest.com/lib/rhul/detail.action?docID=819182
3.
Pfleeger et al CP. Security in Computing. 5th Edition. Upper Saddle River, NJ: Prentice Hall; 2015.
4.
Ford W. Computer Communications Security: Principles, Standards Protocols and Techniques. Englewood Cliffs, N.J.: PTR Prentice Hall; 1994.
5.
Martin KM. Everyday Cryptography: Fundamental Principles and Applications. 2nd Edition. Oxford: Oxford University Press; 2017.
6.
Martin KM. Everyday Cryptography: Fundamental Principles and Applications [Internet]. Second edition. Oxford: Oxford University Press; 2017. Available from: http://dx.doi.org/10.1093/oso/9780198788003.001.0001
7.
Markantonakis K, Mayes KE. Secure Smart Embedded Devices, Platforms and Applications [Internet]. New York: Springer; 2014. Available from: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13404624210002671&institutionId=2671&customerId=2670
8.
Markantonakis K, Mayes KE. Secure Smart Embedded Devices, Platforms and Applications [Internet]. 2014. Available from: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=1466719