1. ISO/IEC 27033-1:2015 Information technology — Security techniques — Network security — Part 1: Overview and concepts.
2. Conrad, Clod (2013) Next Generation Security. Slideshow. URL: https://www.slideshare.net/neoma329/next-generationsecurity (accessed by 04.03.2021).
3. Mayhew, Stephen. History of Biometrics. URL: https://www.biometricupdate.com/201802/history-of-biometrics-2 (accessed by 04.03.2021).
4. MIT Kerberos Documentation. URL: https://web.mit.edu/kerberos/krb5-latest/doc/ (accessed by 04.03.2021).
5. Denning, Dorothy, and Neumann, Peter. Requirements and Model for IDES – A Real-Time Intrusion-Detection Expert System, Final Report. SRI International, 1985. 70 p.