M. Clayton, Clues about who's behind recent cyber attacks on US banks , The Christian Science Monitor, pp. 11, 2012. Available: https://search.proquest.com/docview/1081779990 .
B. Harrison, E. Svetieva, and A. Vishwanath, Individual processing of phishing emails , Online Information Review, vol. 40, (2), pp. 265-281, 2016. Available: https://search.proquest.com/docview/1776786039 .
M. Andress, Network vulnerability assessment management: Eight network scanning tools offer beefed-up management and remediation , Network World, vol. 21, (45), pp. 48-48,50,52, 2004. Available: https://search.proquest.com/docview/215973410 .
Nmap: the Network Mapper - Free Security Scanner , Nmap.org , 2017. [Online]. Available: https://nmap.org/ . [Accessed: 20- Jul- 2017].
Metasploit Unleashed , Offensive-security.com, 2017. [Online]. Available: https://www.offensive-security.com/metasploit-unleashed/msfvenom/ . [Accessed: 21- Jul- 2017].
Free Download John the Ripper password cracker |, Hacking Tools, 2017. [Online]. Available: http://www.hackingtools.in/free-download-john-the-ripper-password-cracker/ . [Accessed: 21- Jul- 2017].
R. Upadhyay, THC-Hydra Windows Install Guide Using Cygwi n, HACKING LIKE A PRO , 2017. [Online]. Available: https://hackinglikeapro.blogspot.co.ke/2014/12/thc-hydra-windows-install-guide-using.html . [Accessed: 21- Jul- 2017].
S. Wilbanks and S. Wilbanks, WireShark , Digitalized Warfare, 2017. [Online]. Available: http://digitalizedwarfare.com/2015/09/27/keep-calm-and-use-wireshark/ . [Accessed: 21- Jul- 2017].
Packet Collection and WEP Encryption, Attack & Defend Against Wireless Networks - 4 , Ferruh.mavituna.com , 2017. [Online]. Available: http://ferruh.mavituna.com/paket-toplama-ve-wep-sifresini-kirma-kablosuz-aglara-saldiri-defans-4-oku/ . [Accessed: 21- Jul- 2017].
Hack Like a Pro: How to Find Vulnerabilities for Any Website Using Nikto , WonderHowTo , 2017. [Online]. Available: https://null-byte.wonderhowto.com/how-to/hack-like-pro-find-vulnerabilities-for-any-website-using-nikto-0151729/ . [Accessed: 21- Jul- 2017].
Kismet , Tools.kali.org , 2017. [Online]. Available: https://tools.kali.org/wireless-attacks/kismet . [Accessed: 21- Jul- 2017].
A. Iswara, How to Sniff People's Password? (A hacking guide with Cain & Abel - ARP POISONING METHOD) , Hxr99.blogspot.com, 2017. [Online]. Available: http://hxr99.blogspot.com/2011/08/how-to-sniff-peoples-password-hacking.html . [Accessed: 21- Jul- 2017].
A. Gouglidis, I. Mavridis, and V. C. Hu, Security policy verification for multi-domains in cloud systems , International Journal of Information Security, vol. 13, (2), pp. 97-111, 2014. Available: https://search.proquest.com/docview/1509582424 DOI: http://dx.doi.org/10.1007/s10207-013-0205-x .
R. Oliver, Cyber insurance market expected to grow after WannaCry attack ,FT.Com, 2017. Available: https://search.proquest.com/docview/1910380348 .
N. Lomas. (Aug 19). Full Ashley Madison Hacked Data Apparently Dumped On Tor. Available: https://search.proquest.com/docview/1705297436 .
D. FitzGerald, Hackers Used Yahoo's Own Software Against It in Data Breach; 'Forged cookies' allowed access to accounts without password , Wall Street Journal (Online), 2016. Available: https://search.proquest.com/docview/1848979099 .
R. Sinha, Compromised! Over 32 mn Twitter passwords reportedly hacked Panache] , The Economic Times (Online), 2016. Available: https://search.proquest.com/docview/1795569034 .
T. Bradshaw, Apple's internal systems hacked , FT.Com, 2013. Available: https://search.proquest.com/docview/1289037317 .
M. Clayton, Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant? , The Christian Science Monitor, 2010. Available: https://search.proquest.com/docview/751940033 .
D. Palmer, How IoT hackers turned a university's network against itself , ZDNet, 2017. [Online]. Available: http://www.zdnet.com/article/how-iot-hackers-turned-a-universitys-network-against-itself/ . [Accessed: 04- Jul- 2017].
S. Zhang, The life of an exhacker who is now banned from using the internet , Gizmodo.com, 2017. [Online]. Available: http://gizmodo.com/the-life-of-an-ex-hacker-who-is-now-banned-from-using-t-1700074684 . [Accessed: 04- Jul- 2017].
Busted! FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online , Mail Online , 2017. [Online]. Available: http://www.dailymail.co.uk/news/article-2129257/Higinio-O-Ochoa-III-FBI-led-Anonymous-hacker-girlfriend-posts-picture-breasts-online.html . [Accessed: 28- Nov- 2017].