1. Bohush, V., Dovydkov, O. & Kryvutsa, V. (2010). Theoretical foundations of protected information technologies. DUIKT.
2. Information and cyber security (2015).
3. Buriachok, V., Korchenko, L. & Buriachok, O. (2012). Social engineering as a method of reconnaissance of information and telecommunication systems. Zakhyst informatsii, 4(57), pp. 5-12.
4. Hryshchuk, R.& Danyk, Yu. (2016). Fundamentals of cyber security: a monograph.
5. Haivoronskyi, M.& Novikov, O. (2009). Security of information and communication systems.