1. Tyner, K., 2014. Literacy in a digital world: Teaching and learning in the age of information. Routledge.
2. http://resources.infosecinstitute.com/the-top-five-cyber-security-vulnerabilities-in-terms-of-potential-for-catastrophic-damage/ .
3. Seshadri, A., Perrig, A., Van Doorn, L. and Khosla, P., 2004, May. SWATT: Software-based attestation for embedded devices. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (pp. 272–282). IEEE.
4. Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L. and Khosla, P., 2005, October. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In ACM SIGOPS Operating Systems Review (Vol. 39, No. 5, pp. 1–16). ACM.
5. Kennell, R. and Jamieson, L.H., 2003, August. Establishing the Genuinity of Remote Computer Systems. In USENIX security (p. 21).