1. Abrams M, Weiss J (2008). Malicious control system cyber security attack case study—Maroochy water services. The MITRE Corporation, July 23, 2008. Available at: http://www.mitre.org/work/tech_papers/tech_papers_08/08_1145/08_1145.pdf
2. ISO/IEC 27002 (2005). Information Technology—Security Techniques—Code of Practice for Information Security Management (Redesignated from ISO/IEC 17799:2005 in 2007). Weissman O (Germany) Plate A (UK), eds. International Organization for Standardization, Geneva, Switzerland, 2007
3. Panguluri S, Phillips W R Jr, Ellis P (2011). Handbook of Water and Wastewater Systems Protection, Chapter 16—Cyber Security: Protecting Water and Wastewater Infrastructure. Clark R M, et al. eds. Springer Science_Business Media, LLC 2011
4. PBS (2004). Frontline program titled “Cyber War!” Airdate: April 24, 2003, http://www.pbs.org/wgbh /pages/frontline/shows/cyberwar/
5. Phillips W R Jr (2009a). Typical water/wastewater utility’s business and SCADA infrastructure and network connectivity. Copyright 2009 by CH2M Hill. Reprinted with Permission