Medeiros, João Paulo S.; Brito Jr., Agostinho M.; Pires, Paulo S. Motta (2009). Computational Intelligence in Security for Information Systems. Advances in Intelligent and Soft Computing. Vol. 63. hlm. 1–8. doi:10.1007/978-3-642-04091-7_1. ISBN978-3-642-04090-0.
"How To Conduct A Security Audit"(PDF). PC Network Advisor. No. 120. July 2000. Diarsipkan dari asli(PDF) tanggal 2021-04-27. Diakses tanggal 2018-10-29.
thehackreport.com
Joshi, Sagar (2021-02-25). "What is Nmap And Why You Should Use It?". The Hack Report (dalam bahasa American English). Diakses tanggal 2021-03-01. Pemeliharaan CS1: Status URL (link)
"How To Conduct A Security Audit"(PDF). PC Network Advisor. No. 120. July 2000. Diarsipkan dari asli(PDF) tanggal 2021-04-27. Diakses tanggal 2018-10-29.