The University of SydneyPage 58References –Lecture 3–Most slides for toady’s talk are adapted from –Computer Networking: A Top DownApproach 7th Ed. Jim Kurose, Keith RossPearson -Addison-Wesley–Chapter 8: Security–Principles of Information Security Systems –Texts and Cases –Gurpreet Dhillon–Chapter 2 : Security of Technical Systems in Organisations Chapter 5 : NetworkSecurity–Security in Computing –Charles & Shari PfleegerChapter 7 : Security in Networks