| Anderson, R.: Security Engineering, John Wiley, 2001 |
| Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002 |
| Buttyan, L. and Hubaux, J. - P.: Security and Cooperation in Wireless N etworks, Cambridge University Press, 2008 |
| Defense Advanced Research Projects Agency ( DARPA ), HIGH PERFORMANCE MICROCHIP SUPPLY , www.cra.org/govaffairs/images/2005 - 02 - HPMS_Report_Final.pd |
| Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983 |
| Eckert, C.: IT - Sicherheit, 3.Aufl., Oldenbourg - Verlag, 2004 |
| Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994 |
| Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004 |
| Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004 |
| Garvey P.R.: Analytical Methods for Risk Management: A Systems Engineering Perspective, ser. Statistics: a Series of Textbooks and Monographs. Boca Raton, FL, USA: Chapman and Hall/CRC, 2009 |
| Gollmann, D.: Computer Security, John Wiley & Sons, 1999 |
| Howard,M.; LeBlanc,D.: Writing Sec ure Code, Microsoft Press, 2001 |
| Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008 |
| Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994 |
| Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf |
| Peter J. Denning. Computers Und er Attack: Intruders, Worms and Viruses. Addison - Wesley Professional, 1990 |
| Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007 |
| Sean Smith und John Marchesini: The Craft of System Security , Addison - Wesley Longman, Amsterdam |
| Sean W. Smith Tru sted Computing Platforms: Design and Applications , Springer, Berlin |
| Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006 |
| Tansu Alpcan and Tamer Başar.: Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, 2011 |
| U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series |
| William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison - We sley Professional, 2003. |