1. Anderson, J. P. (1972). ‘Computer security technology planning study’. Electronic systems division, air force systems command. Bedford, MA: Hanscom Field.
2. Aström, K. J., & Murray, R.,. M. (2010). Feedback systems: An introduction for scientists and engineers. Princeton University Press.
3. Bellman, R. (2008). Stability theory of differential equations. Courier Corporation.
4. Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley.
5. Calder, A. (2009). Information security based on ISO 27001/ISO 27002: A management guide–best practice. Hertogenbosch: Van Haren Publishing.