1. Garman J (2003) Kerberos: the definitive guide. O’Reilly, Sebastopol
2. Stamp M (2005) Information security: principles and practice. Wiley, Hoboken
3. Stewart JM, Tittel E, Chapple M (2008) CISSP: certified information systems security professional study guide, 4th edn. Sybex, San Francisco
4. Todorov D (2007) Mechanics of user identification and authentication: fundamentals of identity management. Auerbach Publications, Boca Raton
5. Whitman ME, Mattord HJ (2007) Principles of information security, 3rd edn. Thomson Course Technology, Boston