Alley, Michael. 2003. The Craft of Scientific Presentations: Critical Steps to Succeed and Critical Errors to Avoid. New York: Springer.
Anon. 18AD. ‘The Belmont Report’.
Anon. n.d.-a. ‘Report of Columbia Accident Investigation Board’. 1.
Anon. n.d.-b. ‘Which Stats Test’. Retrieved (http://methods.sagepub.com/which-stats-test/).
Dittrich, David, and Erin Kenneally. n.d. ‘The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research’.
Edwards, Marc A., and Siddhartha Roy. 2017. ‘Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition’. Environmental Engineering Science 34(1):51–61. doi: 10.1089/ees.2016.0223.
Herley, Cormac, and P. C. van Oorschot. 2017. ‘SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit’. Pp. 99–120 in 2017 IEEE Symposium on Security and Privacy (SP). IEEE.
Keshav, S. 2007. ‘How to Read a Paper’. ACM SIGCOMM Computer Communication Review 37(3). doi: 10.1145/1273445.1273458.
Michael Alley. 2013. The Craft of Scientific Presentations: Critical Steps to Succeed and Critical Errors to Avoid. Springer; 2nd ed. 2013 edition (April 30, 2013).
Tufte, Edward R. 1990. Envisioning Information. Cheshire, Conn: Graphics Press.
Tufte, Edward R. 1997. Visual Explanations: Images and Quantities, Evidence and Narrative. Cheshire, Conn: Graphics Press.
Tufte, Edward R. 2001. The Visual Display of Quantitative Information. 2nd ed. Cheshire, Conn: Graphics Press.
Tufte, Edward R. 2003. The Cognitive Style of Powerpoint. Cheshire, Conn: Graphics Press.
Tufte, Edward R. 2006. Beautiful Evidence. Cheshire, Conn: Graphics Press.
Urban, Tim. 2016. ‘Doing a TED Talk: The Full Story’. Retrieved (http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html).
Zhu, Yan. 2016. ‘Surveillance, Whistleblowing, and Security Engineering’. Retrieved (https://diracdeltas.github.io/blog/surveillance/).