1. Forouzan BA (2007) Cryptography and network security. Tata McGraw-Hill, New Delhi
2. Kahate A. Cryptography and network security. McGraw Hill Education (India) Private Limited
3. Stallings W. Cryptography and network security: principle and practice. Pearson
4. Skulkin O (2022) Incident response techniques for ransomware attacks: understand modern ransomware attacks and build an incident response strategy to work through them. Packt Publishing
5. Li H, Chen J, Jin X (2011) An outlook on network honeypot. In: 2011 international conference on computer science and service system (CSSS), Nanjing, pp 1102–1105. https://doi.org/10.1109/CSSS.2011.5972238