1. Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall, Upper Saddle River
2. Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomason Learning, Boston
3. The Rainbow Books. National Computer Security Center
4. Marshall B (2007) Tips for avoiding bad authentication challenge questions. White Paper. Security PS. http://www.passwordresearch.com/files/TipsforAvoidingBadQuestions.pdf
5. What is two-factor authentication? https://www.microsoft.com/en-us/security/business/security-101/what-is-two-factor-authentication-2fa