//-->
Network security assessment : from vulnerability to patch
Manzuik, Steve, (2007)
Secure multi-party non-repudiation protocols and applications
Onieva, Jose A., (2009)
Information security governance : a practical development and implementation approach
Brotby, W. Krag, (2009)