REFERENCES
- Cisco Documentation. “Evolution of the Firewall Industry.” Available: <http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ch3.htm>. Accessed: May 4, 2009 .
- Lynch , H. Merril . “Firewall Fundamentals.” Information Systems Security 9, no. 5(November/December 2000 ): 24 – 34 .
- Malec , Heather . “Firewalls Guard Perimeter.” Security 36 , no. 6 ( 1999 ): 81 .
- Curtin , Matt , and Ranum , Marcus, J. “Firewalls FAQ.” Available: <http://www.faqs.org/faqs/firewalls-faq/>. Accessed: May 4, 2009 .
- Wikipedia . “Firewalls.” Available: <http://en.wikipedia.org/wiki/Firewalls>. Accessed: May 11, 2009 .
- Wikipedia . “Computer Port (Software).” Available: <http://en.wikipedia.org/wiki/Computer_port_(software)>. Accessed: May 11, 2009 .
- Wikipedia . “MAC Address.” Available: <http://en.wikipedia.org/wiki/Mac_address>. Accessed: May 11, 2009 .
- Harwood , Mike. Exam Cram: Comp TIA Network+. , 3rd ed. n.p. Indianapolis, IN : Pearson Education Inc. , 2009 .
- Frolick , Mark, N. “A New Webmaster's Guide to Firewalls and Security.” Information Systems Management ( Winter 2003 ): 29 – 34 .
- Comments and suggestions should be sent to the Column Editor: B. Douglas Blansit ([email protected]).