- Bosworth; Kabay, M. E.; and Whyne, . (2014). Computer Security Handbook, Set, 6th ed. Hoboken, NJ: John Wiley & Sons, Inc.
Cyber Security & Management
- Drucker, P. (2011). Management: Tasks, Responsibilities, Practices. New York, NY: Routledge Publishing.
- Iannarelli, J. G., & O’Shaughnessy, M. (2015). Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information (1st ed.). Amsterdam, Netherlands: Elsevier.
- Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for Executives: A Practical Guide. Hoboken, NJ: John Wiley & Sons.
Applied Cryptography
- Ferguson, N., Schneier, B. & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Hoboken, NJ: John Wiley & Sons. 2010.
Secure Systems Architecture
- Clark, A., Lynas, D., and Sherwood, A. (2005). Enterprise Security Architecture: A Business Driven Approach. Boca Raton. FL: Taylor and Francis.
- National Institute of Standards and Technology. (2017). Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.Washington, D.C.: National Institute of Standards and Technology.
- Drucker, P. (2011). Management: Tasks, Responsibilities, Practices. New York, NY: Routledge Publishing.
- Iannarelli, J. G., & O’Shaughnessy, M. (2015). Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information (1st ed.). Amsterdam, Netherlands: Elsevier.
- Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for Executives: A Practical Guide. Hoboken, NJ: John Wiley & Sons.
- Johnson, R. (2015). Security Policies and Implementation Issues, 2nd Edition. Burlington, MA: Jones & Bartlett Learning.
- Bosworth, S; Kabay, M. E.; and Whyne, E. (2014). Computer Security Handbook, Set, 6th ed. Hoboken, NJ: John Wiley & Sons, Inc.
- Jensen, C.; McElreath, D.; Graves, M. (2013). Introduction to Intelligence Studies. Boca Raton. FL: Taylor and Francis.
- Gourley, B. (2016). The Cyber Threat. San Bernardino, CA.
Network Visualization
- McGuerty, J. (2018). Network Field Survival Guide.