1. Alberts, C.J., Dorofee, A.J.: Managing Information Security Risks: The OCTAVE Approach. Addison-Wesley Professional (July 2002)
2. Lecture Notes in Computer Science;C. Mulliner,2006
3. Carey, M.: Enterprise Risk Management: How to Jumpstart Your Implementation Efforts. International Risk Management Institute (February 2005)
4. Shtykh, R.Y., Jin, Q.: A Human-Centric integrated approach to web information search and sharing. Human-centric Computing and Information Sciences 1(2) (November 2011)
5. Obaidat, M.S., Zarai, F.: Novel algorithm for Secured Mobility and IP Traceability for WLAN Networks. Journal of Convergence 3(2), 1–8 (2012)