//-->
Unauthorised access : physical penetration testing for IT security teams
Allsopp, Wil, (2009)
The ethical hack : a framework for business value penetration testing
Tiller, James S., (2005)
Secure multi-party non-repudiation protocols and applications
Onieva, Jose A., (2009)