Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
"Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11. https://web.archive.org/web/20130911175015/http://oxforddictionaries.com/definition/english/keylogger
"Rootkits, Part 1 of 3: The Growing Threat" (PDF). McAfee. 2006-04-17. Archived from the original (PDF) on 2006-08-23. https://web.archive.org/web/20060823090948/http://www.mcafee.com/us/local_content/white_papers/threat_center/wp_akapoor_rootkits1_en.pdf
Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
Microsoft Technet (9 December 2009). "Virtual Private Networking: An Overview". Archived from the original on 2017-09-25. https://technet.microsoft.com/en-us/library/bb742566.aspx
Harley, David (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN 9780080558660. Archived from the original on 2014-01-03. Retrieved 2013-06-10. 9780080558660
Rosenblatt, Seth (2013-03-15). "Android antivirus apps improve their grades". cnet. CBS Interactive. Archived from the original on 2013-04-13. Retrieved 2013-06-10. http://download.cnet.com/8301-2007_4-57398501-12/android-antivirus-apps-improve-their-grades-just-not-very-much/
Owano, Nancy (2013-01-18). "Microsoft Security Essentials misses AV-Test Certified status". PhysOrg. Douglas, Isle of Man: Omicron Technology Ltd. Archived from the original on 2013-03-10. Retrieved 2013-06-10. https://web.archive.org/web/20130310012934/http://phys.org/news/2013-01-microsoft-essentials-av-test-certified-status.html
Rosenblatt, Seth (2013-04-08). "Windows 8's rising security tide raises all antivirus boats". cnet. CBS Interactive. Archived from the original on 2013-06-10. Retrieved 2013-06-10. http://reviews.cnet.com/8301-3667_7-57578546/windows-8s-rising-security-tide-raises-all-antivirus-boats/
Rubenking, Neil J. (2013-01-16). "Microsoft and Others Fail Antivirus Test". PC Magazine. Ziff Davis. Archived from the original on 2013-05-11. Retrieved 2013-06-10. http://securitywatch.pcmag.com/security-software/307051-microsoft-and-others-fail-antivirus-test
Owano, Nancy (2013-01-18). "Microsoft Security Essentials misses AV-Test Certified status". PhysOrg. Douglas, Isle of Man: Omicron Technology Ltd. Archived from the original on 2013-03-10. Retrieved 2013-06-10. https://web.archive.org/web/20130310012934/http://phys.org/news/2013-01-microsoft-essentials-av-test-certified-status.html
Rubenking, Neil J. (2013-01-16). "Microsoft and Others Fail Antivirus Test". PC Magazine. Ziff Davis. Archived from the original on 2013-05-11. Retrieved 2013-06-10. http://securitywatch.pcmag.com/security-software/307051-microsoft-and-others-fail-antivirus-test
Dawson, Jessica; Thomson, Robert (2018-06-12). "The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance". Frontiers in Psychology. 9: 744. doi:10.3389/fpsyg.2018.00744. ISSN 1664-1078. PMC 6005833. PMID 29946276. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6005833
"About McAfee" (PDF). 20 September 2012. Archived (PDF) from the original on 27 January 2013. http://www.mcafee.com/us/resources/brochures/br-mcafee-fact-sheet.pdf
"Intel Completes Acquisition of McAfee". McAfee News. 28 February 2011. Archived from the original on 27 August 2011. Retrieved 19 November 2014. https://web.archive.org/web/20110827102142/http://www.mcafee.com/us/about/news/2011/q1/20110228-01.aspx
"Intel in $7.68bn McAfee takeover". BBC News. 19 August 2010. Archived from the original on 19 August 2010. https://www.bbc.co.uk/news/business-11025866
Article Archived 2017-10-13 at the Wayback Machine on VentureBeat https://venturebeat.com/2014/01/06/mcafee-is-rebranding-as-intel-security-will-offer-some-free-products/
CERIAS home page Archived 2005-03-08 at the Wayback Machine http://www.cerias.purdue.edu/
"CERT Coordination Center". Archived from the original on 2015-02-27. Retrieved 2015-03-03. http://www.cert.org/vulnerability-analysis/knowledgebase/index.cfm
"Georgia Tech Information Security Center History". Archived from the original on 2007-08-11. Retrieved 2007-08-01. https://web.archive.org/web/20070811074846/http://www.gtisc.gatech.edu/history.html
"About AISA". Archived from the original on 29 November 2014. Retrieved 19 November 2014. https://www.aisa.org.au/about-aisa/
"Microsoft Digital Crimes Unit". Redmond, WA: Microsoft. Archived from the original on 2013-12-10. Retrieved 2013-11-15. http://www.microsoft.com/government/ww/safety-defense/initiatives/pages/digital-crimes-unit.aspx
"Canadian Cyber Incident Response Centre". Archived from the original on 2009-02-08. Retrieved 2009-04-25. https://web.archive.org/web/20090208001508/http://www.publicsafety.gc.ca/prg/em/ccirc/index-eng.aspx
CCIS, Center for Cyber and Information Security -. "Norwegian Cyber Defence | Center for Cyber and Information Security". Center for Cyber and Information Security. Archived from the original on 2016-08-28. Retrieved 2017-02-13. https://ccis.no/partnere/cyberforsvaret/
Andersson and Reimers, 2019, CYBER SECURITY EMPLOYMENT POLICY AND WORKPLACE DEMAND IN THE U.S. GOVERNMENT, EDULEARN19 Proceedings, Publication year: 2019 Pages: 7858-7866 https://library.iated.org/view/ANDERSON2019CYB https://library.iated.org/view/ANDERSON2019CYB
"Air Force senior leaders take up key decisions". Air Force Link. United States Air Force. 7 October 2008. Archived from the original on 17 October 2008. Retrieved 22 October 2008. https://www.af.mil/News/story/id/123118700/
"DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)" (PDF). DoDD 5505.13E. Archived from the original (PDF) on 26 October 2011. Retrieved 18 May 2011. https://web.archive.org/web/20111026062557/http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf
"Ten Years After: The FBI Since 9/11". FBI.gov. Federal Bureau of Investigation. Archived from the original on 29 November 2014. Retrieved 20 November 2014. https://www.fbi.gov/about-us/ten-years-after-the-fbi-since-9-11/just-the-facts-1/cyber
Cyber Crime, p. 2 ("Cyber Crime". Archived from the original on 2016-04-25. Retrieved 2016-06-20.) /wiki/Cyber_Crime
FBI's Ability to Address the National Security Cyber Intrusion Threat, p. 2 (PDF Archived 2013-03-11 at the Wayback Machine) https://www.justice.gov/oig/reports/FBI/a1122r.pdf
"Mission & Strategy". www.nsa.gov. Archived from the original on 2017-02-14. Retrieved 2017-02-13. https://www.nsa.gov/about/mission-strategy/
"About the National Cybersecurity and Communications Integration Center". Archived from the original on September 4, 2013. Retrieved September 4, 2013. https://www.dhs.gov/about-national-cybersecurity-communications-integration-center
"US-CERT Infosheet Version 2" (PDF). Archived (PDF) from the original on May 12, 2013. Retrieved September 4, 2013. http://www.us-cert.gov/sites/default/files/publications/infosheet_US-CERT_v2.pdf
U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010 "U.S. Cyber Command - U.S. Strategic Command". Archived from the original on 2014-04-16. Retrieved 2014-04-16. https://web.archive.org/web/20140416192156/http://www.stratcom.mil/factsheets/2/Cyber_Command/
Danny Yadron, John McAfee at Def Con: Don’t Use Smartphones Archived 2017-07-12 at the Wayback Machine, The Wall Street Journal, August 08, 2014 https://blogs.wsj.com/digits/2014/08/08/john-mcafee-at-def-con-dont-use-smartphones/