
Rennie, L., Shore, M.(2007). An Advanced Model of Hacking. Retrieved from http://search.proquest.com.ezproxy.lib.monash.edu.au/docview/230350389?OpenUrlRefId=info:xri/sid:primo&accountid=12528

Kizza, J.M.(2003). Ethical and social issues in the information age. Retrieved from http://link.springer.com.ezproxy.lib.monash.edu.au/book/10.1007%2F978-1-%2084628-659-%209

Kizza, J.M. (2014). Computer Network Security and Cyber Ethics, pp 96 – pp 99. Retrieved from http://ebookcentral.proquest.com.ezproxy.lib.monash.edu.au/lib/monash/detail.action?docID=1653191

Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston: Northeastern University Press.

Warren, M. J. (2007). Hackers and Cyber Terrorists. In M. Quigley (Ed.), Encyclopedia of Information Ethics and Security (pp. 304-311). Hershey, PA: . doi:10.4018/978-1-59140-987-8.ch046

Palmer, C.C. (2001). Ethical Hacking. Retrieved from http://pdf.textfiles.com/security/palmer.pdf

Elizabeth, R.(2010). Ethical Hacking: Understanding the benefits, goals and disadvantages. Retrieved from http://www.brighthub.com/internet/security-privacy/articles/77412.aspx

Ramesh, P.(2014). Ethical hacking and its disadvantages. Retrieved from http://www.ijetcse.com/wp-content/plugins/ijetcse/file/upload/docx/104ETHICAL-HACKING-AND-IT—S-ADVANTAGES-pdf.pdf

Bott, F. (2005). Professional issues in information technology. Swindon: British Computer Society. Retrieved from http://shop.bcs.org/resources/pdf/9781780171807.pdf

Holt, T., Kilger, M. (2012, May 28). Know Your Enemy: The Social Dynamics of Hacking. Retrieved From https://www.honeynet.org/papers/socialdynamics

Johansen, R. (2015, June 22). Ethical hacking code of ethics: Security, risk & issues – Panmore institute. Retrieved October 14, 2016, from Business, http://panmore.com/ethical-hacking-code-of-ethics-security-risk-issues

Laws. (2015). Ethical hacking: Is it important? Retrieved October 14, 2016, from http://cyber.laws.com/ethical-hacking

Brodkin, J. (2009, April 24). The legal risks of ethical hacking. . Retrieved from http://www.networkworld.com/article/2268198/lan-wan/the-legal-risks-of-ethical-hacking.html

Kirwan, G., & Power, A. (2012). Hacking: Legal and Ethical Aspects of an Ambiguous Activity. In A. Dudley, J. Braman, & G. Vincenti (Eds.) Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices (pp. 21-36). Hershey, PA: . doi:10.4018/978-1-61350-132-0.ch002

Whitman, M. E., & Mattord, H. J. (2005). Principles of information security. Boston, MA: Thomson Course Technology. Legal, Ethical, and Professional Issues in Information Security
