1. Pipkin D (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River
2. Pethia RD Information technology—essential but vulnerable: how prepared are we for attacks?
http://www.cert.org/congressional_testimony/Pethia_testimony_Sep26.html
3. Kizza JM (2003) Ethical and social issues in the information age, 2nd edn. Springer, New York
4. Hurley J, Hemmendinger E Open source and Linux: 2002 poster children for security problems.
http://www.aberdeen.com/ab_abstracts/2002/11/11020005.htm
5. Palumbo J Social engineering: what is it, why is so little said about it and what can be done? SANS.
http://www.sans.org/rr/social/social.php