2. CISSP guide to security essentials Gregory, Peter H., Australia : Cengage Learning, [2015] FINT301
3. Computer networking: a top-down approach Kurose, James F., Harlow, United Kingdom : Pearson Education Limited, [2022]. ADS100
4. Effective cybersecurity: understanding and using standards and best practices Stallings, William, Upper Saddle River, NJ : Addison-Wesley, [2019] FINT301
5. Computer applications for communication, networking, and digital contents: international conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012 : proceedings International Conference on Future Generation Communication and Networking (2012 : Kangnŭng-si, Korea) Berlin ; Springer, c2012. FIN446
6. Implementing cybersecurity: a guide to the National Institute of Standards and Technology Risk Management Framework Kohnke, Anne, Boca Raton, FL : CRC Press, 2017 FINT301
7. Protocol: how control exists after decentralization Galloway, Alexander R., 1974- Cambridge, Massachusetts : MIT Press, [2006] ACT101
8. Fundamentals of information security: a complete go-to guide for beginners to understand all the aspects of information security Nadkarni, Sanil. New Delhi : BPB Publications, 2021. GED112
9. Neural networks and deep learning: a textbook Aggarwal, Charu C., Cham, Switzerland : Springer, [2018] ADS460
10. Big data science in finance Aldridge, Irene, 1975- Hoboken, New Jersey : John Wiley & Sons, Inc., [2021] FIN205