1. K. Summers, W.C. and A. DeJoie. Wireless security techniques: an overview. 2004: ACM.
2. Russell, S. F. Wireless network security for users, 2001. IEEE, p. 172–177.
3. Manley, M., Mcentee, C., Molet, A. & Park, J. Wireless security policy development for sensitive organizations, 2005. IEEE, p. 150–157.
4. Durbin, S. (2011).Tackling converged threats: building a security-positive environment. Network Security (6): 5–8.
5. Herath, T. and H. Rao, Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness Decision Support Systems, 2009. 47(2): p. 154–165.