[1] Adam, B. (2014) Biometrics for Identification and Authentication. Eprint Publishers, Westpoint, USA.
[2] Brian, K. (2006) Security Fix—Citibank Phish Spoofs 2-Factor Authentication. Washington Post Press, Washington, USA.
[3] Bruce, S. (2005) The Failure of Two-Factor Authentication. Schneier Publishers, New York, USA.
[4] DeBorde, D. (2012) Two-Factor Authentication Exposed. Goldman Publishers, New York, USA.
[5] Howard, S. (2016) How Web Sniffing Works. Bellingcat Press, New York, USA.
[6] Hangman, G. (2016) All about iCloud Technology. Kinjo Press, Minnesota, USA.
[7] Mann, J. (2016) Mobile Two Factor Authentication. Pcisecurity Publishers, London, GB.
[8] Tim, K. (2015) The Failure of Two-Factor Authentication. Kinjo Press, Minnesota, USA.
[9] Rosenblatt, S. and Cipriani, J. (2015) Two-Factor Authentication: What You Need to Know (FAQ). Retrieved from
https://www.cnet.com/
[10] Syracuse, F. (2013) Secure Configurations for Network Devices. WestPoint Printers, Virginia, USA.
[11] Sean, A. (2016) Usable Two-Factor Authentication Based on Ambient Sound. Usenix Publishers, New York, USA.
[12] Thomas, J. (2015) Two-Factor Authentication: All You Need to Know. CNET Press, Ohio, USA.
[13] Van, T., Henk, C. and Jajodia, S. (2011) Encyclopedia of Cryptography and Security. Volume 1, Springer Science & Business Media, New York, USA.