1. Gamertsfelder, L., McMillan, R., Handelsmann, A. and Hourigan, P. (2002), E‐Security, Law Book Co., Sydney.
2. Grimes, R.A. (2001), Malicious Mobile Code – Virus Protection for Windows, O'Reilly Media Inc., Sebastopol, CA.
3. Harley, D., Slade, R. and Gattiker, U. (2001), Viruses Revealed, McGraw‐Hill, New York, NY.
4. Mandia, K., Prosise, C. and Pepe, M. (2003), Incident Response and Computer Forensics, 2nd rev. ed., McGraw‐Hill Osborne Media, New York, NY.
5. Personick, S.D. and Patterson, C.A. (2004), Liability for unsecured Systems and Networks, available at: www.nap.edu/html/ciip/ch3.html.