R. Allen, The PENGUIN English Dictionary, Penguin Books, 2003.

F. Bo?ek, L. Je?onková, J. Dvo?ák, and A. Bo?ek, General Procedure of Risk Management, pp.15-24, 2012.

G. Dardick, Cyber Forensics Assurance In: The Proceedings of the 8th Australian Digital Forensics Conference, pp.57-64, 2010.

E. P. Halibozek and G. L. Kovacich, Securing corporate assets: Protecting a business against cloak-and-dagger tactics requires a manager's eye for efficiency, Industrial Engineer: IE, vol.35, pp.39-43, 2003.

M. Knopová, Bezpe?nost dat v informa?ních systémech, Ikaros, vol.15, 2011.

T. Ludík, J. Navrátil, and A. Langerová, Process Oriented Architecture for Emergency Scenarios in the Czech Republic, World Academy of Science, Engineering and Technology, vol.1, pp.2342-2351, 2011.

T. Ludík and J. Rá?ek, Process Methodology for Emergency Management, IFIP Advances in Information and Communication Technology, pp.302-309, 2011.
DOI : 10.1007/978-3-642-22285-6_33

K. D. Mitnick and W. L. Simon, The art of deception: controlling the human element of security, 2002.

J. F. Urbánek, Scéná?e adaptivní kamuflá?e, Tribun EU, 2012.

J. F. Urbánek and J. Pr?cha, A Development of Wireless Interoper-mobile Application for Outdoor Operation Management, 8 th Int. Conf. on Electronics, hardware, wireless and optical communications, pp.57-64, 2009.