1. Axelsson S. Intrusion Detection and Prevention. — Springer, 2005.
2. Bishop M. Computer Security: Art and Science. — Addison-Wesley Professional, 2018.
3. Carvallo J. P., Wang X. Intrusion Detection and Prevention. — Springer, 2003.
4. Cheswick W. R., Bellovin S. M. Firewalls and Internet Security: Repelling the Wily Hacker. — Addison-Wesley Professional, 2003.
5. Easttom C. Computer Security Fundamentals. — Pearson IT Certification, 2019.
6. Engebretson P. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. — Syngress, 2013.
7. Erickson J. Hacking: The Art of Exploitation. — No Starch Press, 2008.
8. Ferguson N., Schneier B., Kohno T. Cryptography Engineering: Design Principles and Practical Applications. — Wiley, 2010.
9. Garfinkel S., Spafford G. Web Security, Privacy & Commerce. — O'Reilly, 2002.
10. Goodrich M. T., Tamassia R. Introduction to Computer Security. — Pearson, 2010.
11. Harper A., Harris S., Ness J., Eagle C. et al. Gray Hat Hacking: The Ethical Hacker's Handbook. — McGraw Hill, 2018.
12. Lehtinen R. Computer Security Basics. — O'Reilly, 2006.
13. Malin C. H., Casey E., Aquilina J. M. Malware Forensics Field Guide for Windows Systems. — Syngress, 2012.
14. McClure S., Scambray J., Kurtz G. Hacking Exposed: Network Security Secrets & Solutions. — McGraw Hill, 2012.
15. Menezes A. J., Oorschot P. C. van, Vanstone S. A. Handbook of Applied Cryptography. — CRC Press, 1996.
16. Mitnick K. D., Simon W. L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. — Wiley, 2009.
17. Pfleeger Ch. P., Pfleeger Sh. L. Security in Computing. — Pearson, 2015.
18. Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. — Wiley, 1996.
19. Stallings W., Brown L. Computer Security: Principles and Practice. — Pearson, 2017.
20. Stamp M. Computer Security and Cryptography. — Wiley, 2021.
21. Stanislav M. Networks and Network Security.
22. Stuttard D., Burnett M. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws. — Spring, 2019.
23. Weidman G. Penetration Testing: A Hands-On Introduction to Hacking. — No Starch Press, 2014.
24. Young A., Yung M. Malicious Cryptography: Exposing Cryptovirology. — Wiley, 2004.