Bibliography
In the bibliography below, I have listed the most useful resources used to help write this book. Many of these are available online, and I have included a pdf copy with the tutorial examples to save you typing in the long URLs.
Chapter 1 Introduction
Book
Click here to kill everybody—Bruce Schneier—ISBN9780393608892
Paper
Lone actor terrorism and SIMAD
Cyberattack on critical infrastructure
- jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/
Arm cyber security manifesto 2018/2019
Web resource
General security blog
IoT security ...
Get Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.